Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-05-2024 01:02

General

  • Target

    73d85bca598fe0f63426ad390306ea4a_JaffaCakes118.doc

  • Size

    179KB

  • MD5

    73d85bca598fe0f63426ad390306ea4a

  • SHA1

    ac91ce91ad79f62b749739dc202962d5bf63a48d

  • SHA256

    8116e0ec558a71b144d6212ee1d386b79b9160668257180f288b1b979b494059

  • SHA512

    a0184d37d9e5c3f687c9f8acb0983c51247c6300ac7a2c7f41e93ef4d84fd3476796fe1ec45f27256cd23ecce3c0220e64d7bcbec957924b380f518d0df7a51d

  • SSDEEP

    1536:uasrbYasrb2rdi1Ir77zOH98Wj2gpng9+a9hSGIRK9b/WYjd2LO6h/QC27TgvY:crfrzOH98ipgpSGYK9TngLOm27TgvY

Score
6/10

Malware Config

Signatures

  • Process spawned suspicious child process 1 IoCs

    This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\73d85bca598fe0f63426ad390306ea4a_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:808
    • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE
      "C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE" -x -s 4672
      2⤵
      • Process spawned suspicious child process
      • Suspicious use of WriteProcessMemory
      PID:3724
      • C:\Windows\system32\dwwin.exe
        C:\Windows\system32\dwwin.exe -x -s 4672
        3⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        PID:1604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/808-10-0x00007FFE73FD0000-0x00007FFE73FE0000-memory.dmp

    Filesize

    64KB

  • memory/808-71-0x00007FFEB6290000-0x00007FFEB6485000-memory.dmp

    Filesize

    2.0MB

  • memory/808-1-0x00007FFEB632D000-0x00007FFEB632E000-memory.dmp

    Filesize

    4KB

  • memory/808-4-0x00007FFE76310000-0x00007FFE76320000-memory.dmp

    Filesize

    64KB

  • memory/808-3-0x00007FFE76310000-0x00007FFE76320000-memory.dmp

    Filesize

    64KB

  • memory/808-7-0x00007FFEB6290000-0x00007FFEB6485000-memory.dmp

    Filesize

    2.0MB

  • memory/808-6-0x00007FFEB6290000-0x00007FFEB6485000-memory.dmp

    Filesize

    2.0MB

  • memory/808-8-0x00007FFE76310000-0x00007FFE76320000-memory.dmp

    Filesize

    64KB

  • memory/808-5-0x00007FFE76310000-0x00007FFE76320000-memory.dmp

    Filesize

    64KB

  • memory/808-11-0x00007FFEB6290000-0x00007FFEB6485000-memory.dmp

    Filesize

    2.0MB

  • memory/808-2-0x00007FFEB6290000-0x00007FFEB6485000-memory.dmp

    Filesize

    2.0MB

  • memory/808-0-0x00007FFE76310000-0x00007FFE76320000-memory.dmp

    Filesize

    64KB

  • memory/808-9-0x00007FFEB6290000-0x00007FFEB6485000-memory.dmp

    Filesize

    2.0MB

  • memory/808-14-0x00007FFEB6290000-0x00007FFEB6485000-memory.dmp

    Filesize

    2.0MB

  • memory/808-13-0x00007FFEB6290000-0x00007FFEB6485000-memory.dmp

    Filesize

    2.0MB

  • memory/808-15-0x00007FFE73FD0000-0x00007FFE73FE0000-memory.dmp

    Filesize

    64KB

  • memory/808-30-0x00007FFEB6290000-0x00007FFEB6485000-memory.dmp

    Filesize

    2.0MB

  • memory/808-31-0x00007FFEB6290000-0x00007FFEB6485000-memory.dmp

    Filesize

    2.0MB

  • memory/808-12-0x00007FFEB6290000-0x00007FFEB6485000-memory.dmp

    Filesize

    2.0MB

  • memory/3724-70-0x00007FFE76310000-0x00007FFE76320000-memory.dmp

    Filesize

    64KB

  • memory/3724-69-0x00007FFE76310000-0x00007FFE76320000-memory.dmp

    Filesize

    64KB

  • memory/3724-68-0x00007FFE76310000-0x00007FFE76320000-memory.dmp

    Filesize

    64KB

  • memory/3724-67-0x00007FFE76310000-0x00007FFE76320000-memory.dmp

    Filesize

    64KB