Analysis

  • max time kernel
    144s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    13-06-2024 03:58

General

  • Target

    a3c1b2d41ea80ac707833061c5691ea5_JaffaCakes118.doc

  • Size

    19KB

  • MD5

    a3c1b2d41ea80ac707833061c5691ea5

  • SHA1

    7303082eebab7e4b7a4998a981457f57716bf347

  • SHA256

    ec7b602a53cc72c9bd1d591d0a5f0460485cc97632fc74686f01864d3eaf8656

  • SHA512

    b2b084a20225dbd36fee2c7e4d04422d964f416f546b521c23c8f62912bc92cd19f39003fa980073263f86635489a642a9478ebbb039152ab9223491e51163de

  • SSDEEP

    192:HIC4SGA4wUpw878cJM8gw8f4+pftI3zIp5rpyo8fZJ16fa:J4NA4wUmRar+p1I3zIp5rpyoSb6

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 20 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\a3c1b2d41ea80ac707833061c5691ea5_JaffaCakes118.doc"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2344

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2344-0-0x000000002F491000-0x000000002F492000-memory.dmp

    Filesize

    4KB

  • memory/2344-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2344-2-0x00000000713CD000-0x00000000713D8000-memory.dmp

    Filesize

    44KB

  • memory/2344-5-0x00000000713CD000-0x00000000713D8000-memory.dmp

    Filesize

    44KB