Analysis
-
max time kernel
119s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-06-2024 14:55
Behavioral task
behavioral1
Sample
9b117b9aac005a6fc047a214458e599d_JaffaCakes118.doc
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
9b117b9aac005a6fc047a214458e599d_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
9b117b9aac005a6fc047a214458e599d_JaffaCakes118.doc
-
Size
166KB
-
MD5
9b117b9aac005a6fc047a214458e599d
-
SHA1
fe9ebb01e99ba191a4b736d17a45dcb783bf00d6
-
SHA256
585823d78240de4f41a50541f7d58b412958dff1c22025302f8487cb4aec7544
-
SHA512
11d8950cdacab9b99260428293314edcb412782d3015c1183683b49f19f7894f2fb32a70fca65ab3c778d5fc442c2db97b60b595d05d52645e274674f50f20d0
-
SSDEEP
3072:s6IB/NXCMUkuQ0vViAOPKWj77/JFwnxgV:IBHUk4vViAOPp77/JF+xgV
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4588 WINWORD.EXE 4588 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4588 WINWORD.EXE 4588 WINWORD.EXE 4588 WINWORD.EXE 4588 WINWORD.EXE 4588 WINWORD.EXE 4588 WINWORD.EXE 4588 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\9b117b9aac005a6fc047a214458e599d_JaffaCakes118.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4588
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5a4e97425c3bc5a6b152aabbde33f2507
SHA103910d80d59bba3b07fa6c71cc87998977ac3cae
SHA25636eeabaefc080207e29b5df8267e35d0d17efc46726a6f8241e2db2aa9028717
SHA5127dbed370bcaea9e9416c122cd90abbcce9946e7f9c4370ef88986062ff79a542a1ac13c669a3b33b5adfbf26c607df2e9eabd5f9d014fa6f54c975c6ca2835bd