Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/06/2024, 10:24

General

  • Target

    8a2c6d82237a45cb65ffd187494e61ad_JaffaCakes118.doc

  • Size

    152KB

  • MD5

    8a2c6d82237a45cb65ffd187494e61ad

  • SHA1

    6f889bee62eaeb50517832c73b30e966dc78f10a

  • SHA256

    b39dbc57e68cf701fad0dedcb81f6851d1241eb91edc91e37894db8d34bea3d5

  • SHA512

    ebf1528671bfa6e231541f2001eda5c54d9dd310b68ef8e98bd66ba0b479baa7e3ebd79d13aae951e270402afde52980b222763017b7f1e26f145735d5d0b487

  • SSDEEP

    1536:sgtIgPgtIgxrdi1Ir77zOH98Wj2gpngR+a9KrqYzE4gLtPxzwV:irfrzOH98ipgoqYzE40xzwV

Score
6/10

Malware Config

Signatures

  • Process spawned suspicious child process 1 IoCs

    This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\8a2c6d82237a45cb65ffd187494e61ad_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1876
    • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE
      "C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE" -x -s 4780
      2⤵
      • Process spawned suspicious child process
      • Suspicious use of WriteProcessMemory
      PID:5016
      • C:\Windows\system32\dwwin.exe
        C:\Windows\system32\dwwin.exe -x -s 4780
        3⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        PID:3900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1876-11-0x00007FFB92DB0000-0x00007FFB92FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/1876-33-0x00007FFB92DB0000-0x00007FFB92FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/1876-1-0x00007FFB52E30000-0x00007FFB52E40000-memory.dmp

    Filesize

    64KB

  • memory/1876-3-0x00007FFB52E30000-0x00007FFB52E40000-memory.dmp

    Filesize

    64KB

  • memory/1876-4-0x00007FFB92E4D000-0x00007FFB92E4E000-memory.dmp

    Filesize

    4KB

  • memory/1876-5-0x00007FFB52E30000-0x00007FFB52E40000-memory.dmp

    Filesize

    64KB

  • memory/1876-6-0x00007FFB92DB0000-0x00007FFB92FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/1876-7-0x00007FFB92DB0000-0x00007FFB92FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/1876-8-0x00007FFB92DB0000-0x00007FFB92FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/1876-9-0x00007FFB50CC0000-0x00007FFB50CD0000-memory.dmp

    Filesize

    64KB

  • memory/1876-13-0x00007FFB92DB0000-0x00007FFB92FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/1876-14-0x00007FFB92DB0000-0x00007FFB92FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/1876-2-0x00007FFB52E30000-0x00007FFB52E40000-memory.dmp

    Filesize

    64KB

  • memory/1876-85-0x00007FFB92DB0000-0x00007FFB92FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/1876-12-0x00007FFB92DB0000-0x00007FFB92FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/1876-16-0x00007FFB50CC0000-0x00007FFB50CD0000-memory.dmp

    Filesize

    64KB

  • memory/1876-15-0x00007FFB92DB0000-0x00007FFB92FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/1876-18-0x00007FFB92DB0000-0x00007FFB92FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/1876-17-0x00007FFB92DB0000-0x00007FFB92FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/1876-0-0x00007FFB52E30000-0x00007FFB52E40000-memory.dmp

    Filesize

    64KB

  • memory/1876-34-0x00007FFB92DB0000-0x00007FFB92FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/1876-65-0x00007FFB92DB0000-0x00007FFB92FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/1876-10-0x00007FFB92DB0000-0x00007FFB92FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/5016-83-0x00007FFB52E30000-0x00007FFB52E40000-memory.dmp

    Filesize

    64KB

  • memory/5016-84-0x00007FFB52E30000-0x00007FFB52E40000-memory.dmp

    Filesize

    64KB

  • memory/5016-81-0x00007FFB52E30000-0x00007FFB52E40000-memory.dmp

    Filesize

    64KB

  • memory/5016-82-0x00007FFB52E30000-0x00007FFB52E40000-memory.dmp

    Filesize

    64KB