Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 13:14
Static task
static1
Behavioral task
behavioral1
Sample
0651024634a991ed5d6b50753cdea5ce_JaffaCakes118.pps
Resource
win7-20240611-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
0651024634a991ed5d6b50753cdea5ce_JaffaCakes118.pps
Resource
win10v2004-20240508-en
4 signatures
150 seconds
General
-
Target
0651024634a991ed5d6b50753cdea5ce_JaffaCakes118.pps
-
Size
201KB
-
MD5
0651024634a991ed5d6b50753cdea5ce
-
SHA1
344315f5b0a5fcc2a930dd89ff9115a20f7f3360
-
SHA256
63eaf8c898eb1ad63510f2b25e2ef4f7e748f5faae5a164fd5112efaa7b50a0d
-
SHA512
1616ac7f21cab3d541b5ade46156249ad2a962930a11c5860ba869ceb469671188deb50274bb036846d1fd254296278d94c808d88ec484d1e7d15b2ecfc96e96
-
SSDEEP
6144:KiN4cam97+bnI6je37x/2xMH2DKTYZ2mMVpzM/lkp:KHcT8Ip37x/2xMH2DKTYZ2mMVpz2kp
Score
1/10
Malware Config
Signatures
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel POWERPNT.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\MenuExt POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" POWERPNT.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" POWERPNT.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2200 POWERPNT.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2808 2200 POWERPNT.EXE 28 PID 2200 wrote to memory of 2808 2200 POWERPNT.EXE 28 PID 2200 wrote to memory of 2808 2200 POWERPNT.EXE 28 PID 2200 wrote to memory of 2808 2200 POWERPNT.EXE 28
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE"C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE" /s "C:\Users\Admin\AppData\Local\Temp\0651024634a991ed5d6b50753cdea5ce_JaffaCakes118.pps"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft Office\Office14\Wordconv.exe"C:\Program Files (x86)\Microsoft Office\Office14\Wordconv.exe" -Embedding1⤵PID:2580