Analysis

  • max time kernel
    135s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 05:19

General

  • Target

    69db660126843cc9ca7092394735c351_JaffaCakes118.rtf

  • Size

    756KB

  • MD5

    69db660126843cc9ca7092394735c351

  • SHA1

    37d4cceb2766ca0ef6d747d5188b96475892c277

  • SHA256

    70a61b9f583b7f4837211571603cf791b334e139d2138b217e2b3af33c565a43

  • SHA512

    86cce32c0fa5289783f1449fa51087297a6cd93c56aefd9e5357610bc2b48e2300f874b1e58b717ce92b29faeeb7b0d9feef852434030b7583b0ed70da0ae0f8

  • SSDEEP

    12288:X+WhWEyIuRalv7sa2beX41VWIr3cTGeIif82GgrMs7JjMt8RdZtz4lTMSQ/skLoB:XIRIGST8iX41oITACitXr7J5RdclT6di

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 5 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\69db660126843cc9ca7092394735c351_JaffaCakes118.rtf" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2740
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4404,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=4604 /prefetch:8
    1⤵
      PID:1504

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\{3CCFB614-DA30-4FEC-B610-D329EAB6F912}\inteldriverupd1.sct:Zone.Identifier
      Filesize

      26B

      MD5

      fbccf14d504b7b2dbcb5a5bda75bd93b

      SHA1

      d59fc84cdd5217c6cf74785703655f78da6b582b

      SHA256

      eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

      SHA512

      aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

    • memory/2740-14-0x00007FFDC1530000-0x00007FFDC1725000-memory.dmp
      Filesize

      2.0MB

    • memory/2740-5-0x00007FFDC15CD000-0x00007FFDC15CE000-memory.dmp
      Filesize

      4KB

    • memory/2740-13-0x00007FFD7EEC0000-0x00007FFD7EED0000-memory.dmp
      Filesize

      64KB

    • memory/2740-1-0x00007FFD815B0000-0x00007FFD815C0000-memory.dmp
      Filesize

      64KB

    • memory/2740-19-0x00007FFDC1530000-0x00007FFDC1725000-memory.dmp
      Filesize

      2.0MB

    • memory/2740-6-0x00007FFDC1530000-0x00007FFDC1725000-memory.dmp
      Filesize

      2.0MB

    • memory/2740-7-0x00007FFDC1530000-0x00007FFDC1725000-memory.dmp
      Filesize

      2.0MB

    • memory/2740-8-0x00007FFDC1530000-0x00007FFDC1725000-memory.dmp
      Filesize

      2.0MB

    • memory/2740-9-0x00007FFD7EEC0000-0x00007FFD7EED0000-memory.dmp
      Filesize

      64KB

    • memory/2740-10-0x00007FFDC1530000-0x00007FFDC1725000-memory.dmp
      Filesize

      2.0MB

    • memory/2740-11-0x00007FFDC1530000-0x00007FFDC1725000-memory.dmp
      Filesize

      2.0MB

    • memory/2740-21-0x00007FFDC1530000-0x00007FFDC1725000-memory.dmp
      Filesize

      2.0MB

    • memory/2740-15-0x00007FFDC1530000-0x00007FFDC1725000-memory.dmp
      Filesize

      2.0MB

    • memory/2740-0-0x00007FFD815B0000-0x00007FFD815C0000-memory.dmp
      Filesize

      64KB

    • memory/2740-4-0x00007FFD815B0000-0x00007FFD815C0000-memory.dmp
      Filesize

      64KB

    • memory/2740-3-0x00007FFD815B0000-0x00007FFD815C0000-memory.dmp
      Filesize

      64KB

    • memory/2740-12-0x00007FFDC1530000-0x00007FFDC1725000-memory.dmp
      Filesize

      2.0MB

    • memory/2740-22-0x00007FFDC1530000-0x00007FFDC1725000-memory.dmp
      Filesize

      2.0MB

    • memory/2740-20-0x00007FFDC1530000-0x00007FFDC1725000-memory.dmp
      Filesize

      2.0MB

    • memory/2740-18-0x00007FFDC1530000-0x00007FFDC1725000-memory.dmp
      Filesize

      2.0MB

    • memory/2740-17-0x00007FFDC1530000-0x00007FFDC1725000-memory.dmp
      Filesize

      2.0MB

    • memory/2740-16-0x00007FFDC1530000-0x00007FFDC1725000-memory.dmp
      Filesize

      2.0MB

    • memory/2740-2-0x00007FFD815B0000-0x00007FFD815C0000-memory.dmp
      Filesize

      64KB

    • memory/2740-49-0x00007FFDC1530000-0x00007FFDC1725000-memory.dmp
      Filesize

      2.0MB

    • memory/2740-77-0x00007FFD815B0000-0x00007FFD815C0000-memory.dmp
      Filesize

      64KB

    • memory/2740-76-0x00007FFD815B0000-0x00007FFD815C0000-memory.dmp
      Filesize

      64KB

    • memory/2740-79-0x00007FFD815B0000-0x00007FFD815C0000-memory.dmp
      Filesize

      64KB

    • memory/2740-78-0x00007FFD815B0000-0x00007FFD815C0000-memory.dmp
      Filesize

      64KB

    • memory/2740-80-0x00007FFDC1530000-0x00007FFDC1725000-memory.dmp
      Filesize

      2.0MB