Analysis
-
max time kernel
113s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 08:48
Static task
static1
Behavioral task
behavioral1
Sample
04774125f6161a45612e6dec0c59119d_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
04774125f6161a45612e6dec0c59119d_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
04774125f6161a45612e6dec0c59119d_JaffaCakes118.doc
-
Size
49KB
-
MD5
04774125f6161a45612e6dec0c59119d
-
SHA1
8c96fcb34f42d21dca895cc56947f417023ce987
-
SHA256
03f84c576aa87510e8c0d37e2486b40c94f3a3db001d269d4679cbcb242a4266
-
SHA512
a008858e16c3bb2d339636c9e853a93e162d39628c496a3d6c22bb5140a7ab3e2708d4703ccb17b68178b1cf54389b905c65448fd6e7008f9236334b15389b4c
-
SSDEEP
192:9eTc88RSAIeeeeeeeeeeeGmTCgxJWzvkisUsfXdqeFJjA0jiQNUXtxkcz/bWWmqO:AlpAcmPIv4MeXjA0jiQgt5VG+L
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1928 WINWORD.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\~WRD0002.tmp\:Zone.Identifier:$DATA WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1928 WINWORD.EXE 1928 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 1928 WINWORD.EXE 1928 WINWORD.EXE 1928 WINWORD.EXE 1928 WINWORD.EXE 1928 WINWORD.EXE 1928 WINWORD.EXE 1928 WINWORD.EXE 1928 WINWORD.EXE 1928 WINWORD.EXE 1928 WINWORD.EXE 1928 WINWORD.EXE 1928 WINWORD.EXE 1928 WINWORD.EXE 1928 WINWORD.EXE 1928 WINWORD.EXE 1928 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\04774125f6161a45612e6dec0c59119d_JaffaCakes118.doc" /o ""1⤵
- Deletes itself
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD5b5f4d7d3ec84249cd717e9c2e7814eb8
SHA121a0e5526416618c53cc682073f44511b4d9b543
SHA256b025144bbb37d05fa5f0688556079b1e6d11f7abc646b31fde2da5da01cab833
SHA512bea7145ba02e309f7b0b4e184e8dcf5a1864623bb6171fa193502e7443c7e2b75b05b0bb9f356cded11375dba62260439dbe8d362479db464a9e821227ed9b9a
-
Filesize
24KB
MD5ff4f1aea110fe52d59b8e1a55f876a06
SHA13239c7acb267f0d5e98c79da2c2dfb85ae79d634
SHA2563a2393033dcb689826f85d5482ddfc5937b003685602268d732ed4e13dbe9986
SHA51223709bf015fa2a12cf514356fbc54cc50da23cafad127cfda35f6ab436ff6b88073cea7d18d176b2687be89976f9b4528bc26a7e9e5c509f6d24302b19642a48
-
Filesize
1KB
MD528d341c72a7e794fc02a71602a379532
SHA14d5e2a325689595376e72aacd34582e68ac1e5cf
SHA2567641d28e39f88898226c58d605732655637335562af35319911825cccae747c9
SHA512e4f4d73abb9fab936896a4c28a048013e3c49bbe76031965c18f540f7700598d9a3521c79e7c841f1c43892b245653a828b112baa5a818b5ca7ada46d806f270
-
Filesize
225B
MD5519755378e58a854e2bd4652f7195193
SHA1eca94844a06772a58cafa8bb4fccb054cdb450c0
SHA256b5aa96f3f7930aced20f57e7f4fe5957e37be0f504fb2f49606f80b19e79bf20
SHA512b1e3a0dc5562e558bb8542c4f9288ce4493ddc9c5c533fff9a07e008a6acef0fbacfc03d867d5ff54fb602e9f3148fa073bb93a1ca386ea42f88b063f0726d52
-
Filesize
1KB
MD569690d79eb459c7474ce5f029c3859b3
SHA1dbabb04ae2e28a37387a55b03334e1e8b8d83200
SHA25650a85970bdafe4f319d21747b32f08289850063b2b3153a0e9c1c1bc37abcf22
SHA5124454b8f22981938b26b69417385b7a72b95433636bc2155e12c7a81d627be2dd4b58934f3d63b5479f2bab27226053507561967baed4b962f42cca47f3532bd7