Analysis

  • max time kernel
    140s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 02:46

General

  • Target

    65be1e3712805bb0356f7e85c861f924_JaffaCakes118.rtf

  • Size

    9KB

  • MD5

    65be1e3712805bb0356f7e85c861f924

  • SHA1

    d33f590a4709e6e702be3d1bd3de4250ecfab4ae

  • SHA256

    12d59763a86b6e9a84d501db4f0bd478d5ed4b73a3425364482e2c834a366e5c

  • SHA512

    8625cb53953b661f2197b1b57cf07cdb1f8d1946a960eadcd9bffc64a7b650f0b53fa48dfe37776b104f61105406bf13fc095ce9884ae74dc53dcb80644fe28c

  • SSDEEP

    48:5fU5NncuBCnb5S2vw3xMa279j+J5ffRKVr9z9OyMjMW5foNmhmXmw9sv5:NaBCnLvwWxBCRKVJz8y7W5fEOmsv5

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\65be1e3712805bb0356f7e85c861f924_JaffaCakes118.rtf" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCD8489.tmp\sist02.xsl

    Filesize

    245KB

    MD5

    f883b260a8d67082ea895c14bf56dd56

    SHA1

    7954565c1f243d46ad3b1e2f1baf3281451fc14b

    SHA256

    ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

    SHA512

    d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

  • memory/3312-12-0x00007FFE95150000-0x00007FFE95345000-memory.dmp

    Filesize

    2.0MB

  • memory/3312-3-0x00007FFE551D0000-0x00007FFE551E0000-memory.dmp

    Filesize

    64KB

  • memory/3312-18-0x00007FFE52C40000-0x00007FFE52C50000-memory.dmp

    Filesize

    64KB

  • memory/3312-5-0x00007FFE951ED000-0x00007FFE951EE000-memory.dmp

    Filesize

    4KB

  • memory/3312-11-0x00007FFE95150000-0x00007FFE95345000-memory.dmp

    Filesize

    2.0MB

  • memory/3312-6-0x00007FFE95150000-0x00007FFE95345000-memory.dmp

    Filesize

    2.0MB

  • memory/3312-9-0x00007FFE95150000-0x00007FFE95345000-memory.dmp

    Filesize

    2.0MB

  • memory/3312-10-0x00007FFE95150000-0x00007FFE95345000-memory.dmp

    Filesize

    2.0MB

  • memory/3312-16-0x00007FFE95150000-0x00007FFE95345000-memory.dmp

    Filesize

    2.0MB

  • memory/3312-15-0x00007FFE95150000-0x00007FFE95345000-memory.dmp

    Filesize

    2.0MB

  • memory/3312-17-0x00007FFE52C40000-0x00007FFE52C50000-memory.dmp

    Filesize

    64KB

  • memory/3312-0-0x00007FFE551D0000-0x00007FFE551E0000-memory.dmp

    Filesize

    64KB

  • memory/3312-4-0x00007FFE551D0000-0x00007FFE551E0000-memory.dmp

    Filesize

    64KB

  • memory/3312-1-0x00007FFE551D0000-0x00007FFE551E0000-memory.dmp

    Filesize

    64KB

  • memory/3312-13-0x00007FFE95150000-0x00007FFE95345000-memory.dmp

    Filesize

    2.0MB

  • memory/3312-14-0x00007FFE95150000-0x00007FFE95345000-memory.dmp

    Filesize

    2.0MB

  • memory/3312-8-0x00007FFE95150000-0x00007FFE95345000-memory.dmp

    Filesize

    2.0MB

  • memory/3312-7-0x00007FFE95150000-0x00007FFE95345000-memory.dmp

    Filesize

    2.0MB

  • memory/3312-2-0x00007FFE551D0000-0x00007FFE551E0000-memory.dmp

    Filesize

    64KB

  • memory/3312-512-0x00007FFE95150000-0x00007FFE95345000-memory.dmp

    Filesize

    2.0MB

  • memory/3312-532-0x00007FFE551D0000-0x00007FFE551E0000-memory.dmp

    Filesize

    64KB

  • memory/3312-533-0x00007FFE551D0000-0x00007FFE551E0000-memory.dmp

    Filesize

    64KB

  • memory/3312-535-0x00007FFE551D0000-0x00007FFE551E0000-memory.dmp

    Filesize

    64KB

  • memory/3312-534-0x00007FFE551D0000-0x00007FFE551E0000-memory.dmp

    Filesize

    64KB

  • memory/3312-536-0x00007FFE95150000-0x00007FFE95345000-memory.dmp

    Filesize

    2.0MB