Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-06-2024 23:08

General

  • Target

    a7094a68fced829653d5048ff4284ebb_JaffaCakes118.rtf

  • Size

    797KB

  • MD5

    a7094a68fced829653d5048ff4284ebb

  • SHA1

    897442a4236d342f17e19180b7619286ba6338ee

  • SHA256

    5d40c51f90bfc15f3b3682dbd0c4f53d89eecb6fe2721da8b0c50d72edf3986f

  • SHA512

    81b72f1329ec6ba901f4830e0bada41f0059b6328beaa78c12992856efaeadf9ef75441ef94567bcc5b8faf43d7e00bc30c8097184e9d18518da5a904ef897e7

  • SSDEEP

    24576:wnIRIrPgX0QMMjcw4HmhTcjgEAE6aoPgX3:K

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 5 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\a7094a68fced829653d5048ff4284ebb_JaffaCakes118.rtf" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\{89834764-B7B8-454A-BB87-8A8B34927ACF}\inteldriverupd1.sct:Zone.Identifier

    Filesize

    26B

    MD5

    fbccf14d504b7b2dbcb5a5bda75bd93b

    SHA1

    d59fc84cdd5217c6cf74785703655f78da6b582b

    SHA256

    eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

    SHA512

    aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

  • memory/3788-8-0x00007FFF9AB70000-0x00007FFF9AD65000-memory.dmp

    Filesize

    2.0MB

  • memory/3788-6-0x00007FFF9AB70000-0x00007FFF9AD65000-memory.dmp

    Filesize

    2.0MB

  • memory/3788-14-0x00007FFF9AB70000-0x00007FFF9AD65000-memory.dmp

    Filesize

    2.0MB

  • memory/3788-4-0x00007FFF5ABF0000-0x00007FFF5AC00000-memory.dmp

    Filesize

    64KB

  • memory/3788-15-0x00007FFF9AB70000-0x00007FFF9AD65000-memory.dmp

    Filesize

    2.0MB

  • memory/3788-5-0x00007FFF9AB70000-0x00007FFF9AD65000-memory.dmp

    Filesize

    2.0MB

  • memory/3788-7-0x00007FFF5ABF0000-0x00007FFF5AC00000-memory.dmp

    Filesize

    64KB

  • memory/3788-16-0x00007FFF587D0000-0x00007FFF587E0000-memory.dmp

    Filesize

    64KB

  • memory/3788-9-0x00007FFF9AB70000-0x00007FFF9AD65000-memory.dmp

    Filesize

    2.0MB

  • memory/3788-12-0x00007FFF587D0000-0x00007FFF587E0000-memory.dmp

    Filesize

    64KB

  • memory/3788-11-0x00007FFF9AB70000-0x00007FFF9AD65000-memory.dmp

    Filesize

    2.0MB

  • memory/3788-0-0x00007FFF5ABF0000-0x00007FFF5AC00000-memory.dmp

    Filesize

    64KB

  • memory/3788-2-0x00007FFF5ABF0000-0x00007FFF5AC00000-memory.dmp

    Filesize

    64KB

  • memory/3788-3-0x00007FFF9AC0D000-0x00007FFF9AC0E000-memory.dmp

    Filesize

    4KB

  • memory/3788-10-0x00007FFF9AB70000-0x00007FFF9AD65000-memory.dmp

    Filesize

    2.0MB

  • memory/3788-18-0x00007FFF9AB70000-0x00007FFF9AD65000-memory.dmp

    Filesize

    2.0MB

  • memory/3788-17-0x00007FFF9AB70000-0x00007FFF9AD65000-memory.dmp

    Filesize

    2.0MB

  • memory/3788-13-0x00007FFF9AB70000-0x00007FFF9AD65000-memory.dmp

    Filesize

    2.0MB

  • memory/3788-1-0x00007FFF5ABF0000-0x00007FFF5AC00000-memory.dmp

    Filesize

    64KB

  • memory/3788-38-0x00007FFF9AB70000-0x00007FFF9AD65000-memory.dmp

    Filesize

    2.0MB

  • memory/3788-65-0x00007FFF5ABF0000-0x00007FFF5AC00000-memory.dmp

    Filesize

    64KB

  • memory/3788-66-0x00007FFF5ABF0000-0x00007FFF5AC00000-memory.dmp

    Filesize

    64KB

  • memory/3788-68-0x00007FFF5ABF0000-0x00007FFF5AC00000-memory.dmp

    Filesize

    64KB

  • memory/3788-67-0x00007FFF5ABF0000-0x00007FFF5AC00000-memory.dmp

    Filesize

    64KB

  • memory/3788-69-0x00007FFF9AB70000-0x00007FFF9AD65000-memory.dmp

    Filesize

    2.0MB