Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:26
Static task
static1
Behavioral task
behavioral1
Sample
6922e3ad588509bc726c47d4c89e471a_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6922e3ad588509bc726c47d4c89e471a_JaffaCakes118.doc
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
decrypted.xlsx
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
decrypted.xlsx
Resource
win10v2004-20240426-en
General
-
Target
6922e3ad588509bc726c47d4c89e471a_JaffaCakes118.doc
-
Size
667KB
-
MD5
6922e3ad588509bc726c47d4c89e471a
-
SHA1
428a3ec8d7f5db735bf1d9d6fba0f7f90394e3b8
-
SHA256
a1f3b7bd804a3f61b92fcf7da6f2fa61b32cdbff244569b34f88b6e4740250e2
-
SHA512
7462437fb254aa47198955fa611e4ef98fe1d0b90c3996a3ed5329bfe926b9530aeb8008ea8a9b2b1cbe37e19cd18511909907f38bf98cef35214bbd3f29895a
-
SSDEEP
12288:slC3lN1JymZnlPU8upnb+o9ImEVjtDFHxh1EVMr55uB/+fYwQ4+1JgG:slC1zBlP65+og53Hxh1EVMr2/+Y4G
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 3576 WINWORD.EXE 3576 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
Processes:
WINWORD.EXEpid process 3576 WINWORD.EXE 3576 WINWORD.EXE 3576 WINWORD.EXE 3576 WINWORD.EXE 3576 WINWORD.EXE 3576 WINWORD.EXE 3576 WINWORD.EXE 3576 WINWORD.EXE 3576 WINWORD.EXE 3576 WINWORD.EXE 3576 WINWORD.EXE 3576 WINWORD.EXE 3576 WINWORD.EXE 3576 WINWORD.EXE 3576 WINWORD.EXE 3576 WINWORD.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\6922e3ad588509bc726c47d4c89e471a_JaffaCakes118.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3576