Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 02:33

General

  • Target

    6975d6d55cc5521805f8e98d280d416d_JaffaCakes118.docx

  • Size

    11KB

  • MD5

    6975d6d55cc5521805f8e98d280d416d

  • SHA1

    b3cfff4656c1c3672968e22e06240133762ffa1c

  • SHA256

    730d3ee3b2f855abcddf1dea7cdc99cbf7dbd8c566caebfebb7af48f17c4c536

  • SHA512

    d14dc34c1c9aeafb5a5f180b0d430c8dca91c23044c44b864e6a2e6f29309f41e1a0a0409bb98aee601c47ee90dedb7e9ba4c706aa915ad85ab0a4c856eea118

  • SSDEEP

    192:CtNCWUyn0i13pNXqkOcPiYFLwzvdX6Ptpwjnw+umHBCD7Vp:aNxUyn0i13LROEiOLkX6Ujnw+3s7Vp

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\6975d6d55cc5521805f8e98d280d416d_JaffaCakes118.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1564

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{BC0A7620-1A58-42C3-9159-137D2DE69960}.FSD
      Filesize

      128KB

      MD5

      ce0909fa7b4f50b2c1067d921d77e7a8

      SHA1

      f0eebca135496c050995284c639b2f723aadeb6d

      SHA256

      716d04d27c9aaf2c66faba266d4b41a1624c1695f2243087e0285adff852f309

      SHA512

      ec657029dfab2927da84c395bcc32567496cf092798acf5664b02cf77725f1af4bf4790ebf8a8a0784fda09ca52355842a72afedff05711819cc0434f55a4ab3

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      d41fbac33a6dcc0cfbb15d7a8b4740f0

      SHA1

      b8c29092032b6b208d4d348e07dfeef47edd3789

      SHA256

      0430115a8de54059be6a3c0b295af6334608cee40ea10b6e38a5f810d5933267

      SHA512

      7c0501080919eeaad4d7c6ca6832fce226c961c60b7067a6bff1ab3d397daa40c2455923b4af165af6021de7afdd2281745ca2106acb6dbb9ae0c10ff6c477a6

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      3b802e23e30347861d946a2e94230f8c

      SHA1

      242a7b12e48d3700de6362637a41807f19d0467c

      SHA256

      f2fc88c77adfcde22189691a55217bb708e30c722c1e65193ccac4cf9563e815

      SHA512

      08c0d13d9f4c6ea679314d13c2e656d0074ca49ad3baa85ff0f2c203f0ea0b228f3f6801c426a2bfc566df8f2d42a6116a71aedb48397b6d1d7f82f6df098dd6

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{2F9FADE1-ABA4-4E30-8A1B-C18EF2E2B5CA}.FSD
      Filesize

      128KB

      MD5

      63b8b5f7587bb90c657a670b1fde9c58

      SHA1

      25200fd8a822cde0395afedfec7a8133a46c6809

      SHA256

      4311d6c68e40bee43296dcfab4143f9e56ab4bf685108483c8a863f0e7011785

      SHA512

      f2a9dddbf9735d5d1e6195442aa35346555eceab52d4516f363eba17d5d5e9081d1415a68a0bc938eba6fbe9c57ab16dd757fb47a25f67479fc7cd68e04f3878

    • C:\Users\Admin\AppData\Local\Temp\{034D6D37-ACE6-4480-998B-4B0BEAE27F9F}
      Filesize

      128KB

      MD5

      159915f5b4d43278b5384609c637a6cb

      SHA1

      10f71b5acea0927523cfdd4f290673136c8ea896

      SHA256

      f550ebe56b41a57326bbaa29d85191c122fccb357dfad32bca24529ee77a282e

      SHA512

      9be0d07843e12306f43fbca5b962deda78b478bff8631d42c56db1be4a16108c23a01aee80b27a87da21e3a455dd332089af2b583c0874bd6536e44cab6c2699

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      7ffe0d63da722088af871d1cafbd0191

      SHA1

      be359dd6d22237ed7383e0a3a5382f0f2d525e37

      SHA256

      c33f34ab7e42bb69b8ea4e0eba3185ee37d91563675d56cf1dc47b59d966fd9a

      SHA512

      62e991497142d8dd773fa16b3a4d0ef93a7b67fa1a0890f370564d2c398ece0f06b405f1fac82b042d6cd29dbf77ef6ac675efdd9e3a3ddd1d512644a05dd64a

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • memory/2220-0-0x000000002F721000-0x000000002F722000-memory.dmp
      Filesize

      4KB

    • memory/2220-2-0x000000007153D000-0x0000000071548000-memory.dmp
      Filesize

      44KB

    • memory/2220-77-0x000000007153D000-0x0000000071548000-memory.dmp
      Filesize

      44KB

    • memory/2220-97-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2220-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2220-98-0x000000007153D000-0x0000000071548000-memory.dmp
      Filesize

      44KB