Analysis

  • max time kernel
    119s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    30/05/2024, 14:25

General

  • Target

    84773231fe9827f0eab90fc85cf113ea_JaffaCakes118.msg

  • Size

    103KB

  • MD5

    84773231fe9827f0eab90fc85cf113ea

  • SHA1

    ce3f3be8b74687abb009386fb5ad7b3138f808a7

  • SHA256

    5665523cf573835a86d39d1dd7f0f7ae886530cafc7d60e8a66767630869e19f

  • SHA512

    be849e1e69f1129ecbba804918920a6b63be24c4008f3fb978e4dabdb4032ed33f68931405db5b750020233c3f415441312425a114d26e3e458376e030089ccb

  • SSDEEP

    768:V/+w6k3JZfubC7FLVucRFoqkp59YBvLdTv9ReVi4eFov5UHRFBt+1o9OkDOsDPjb:Z731ZLocn1kp59gxBK85fBt+a9LdS

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" /f "C:\Users\Admin\AppData\Local\Temp\84773231fe9827f0eab90fc85cf113ea_JaffaCakes118.msg"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    PID:1400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

    Filesize

    240KB

    MD5

    25a41b9c8fb8ed6533df1e9d0ed0ea19

    SHA1

    4e69a1e23a3729c69e54845e905c10db69b1c762

    SHA256

    ca7f6f8c2428e856fb2830f7fe4a5e545f74c3117480cfc3ab16ee8ac2ebf311

    SHA512

    f6bcec18ce8d9a4589b9b81a48d2896c680b50b0dd6f7a7950b49c1e9bd03d00b9781adec59be113e84b793e7c6ae9ef2d5c9613933753f6a193e381f6657a1c

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

    Filesize

    240KB

    MD5

    791eb925714de6d05eb2f1d27e23c8d8

    SHA1

    b5013010d8529e1b1cf0fb4324ade53cc576d527

    SHA256

    05ed57814c37797f1403eff3b376b0d565b411f9e9ab65d66ad23fc0f53c230b

    SHA512

    5d5b81b41999c4df57b4e00dc833aa11b65a34274a06f5acd4451355239122ab2c79e23c56317a795466632f3fd6eefea6b0cc76199a4d02cc04a08934f64f8d

  • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

    Filesize

    1KB

    MD5

    48dd6cae43ce26b992c35799fcd76898

    SHA1

    8e600544df0250da7d634599ce6ee50da11c0355

    SHA256

    7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

    SHA512

    c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

  • memory/1400-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1400-1-0x00000000735FD000-0x0000000073608000-memory.dmp

    Filesize

    44KB

  • memory/1400-124-0x00000000735FD000-0x0000000073608000-memory.dmp

    Filesize

    44KB