Analysis

  • max time kernel
    138s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/06/2024, 16:39

General

  • Target

    0ec921776ae38f6584f6a354e3c6651e_JaffaCakes118.doc

  • Size

    238KB

  • MD5

    0ec921776ae38f6584f6a354e3c6651e

  • SHA1

    9750a3fcc7186769bba755d5ceeecad09c8df4e4

  • SHA256

    456fb7d1f6c71ed4f2e4de9b8788fa104f70caa9c6b6e7c69867e671d736a2ea

  • SHA512

    56227db73736f118b957f9e1ca068f8a9389d11009312d7cb27a412c5321c9dfbfb34f5b76dd5bb92cf36ac33b7fb429ca47f23dded0cde1fc008ee7a93ac516

  • SSDEEP

    3072:a/wDvWETOgnHJcIKBs7GwdS31DMnkpWoYX9:a/avWETrHJ9AqU31YkQoYt

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 15 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 15 IoCs
  • Suspicious behavior: AddClipboardFormatListener 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 29 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0ec921776ae38f6584f6a354e3c6651e_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2396
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1644
  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4912
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:3344
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2680

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A

          Filesize

          471B

          MD5

          748e4b35eb2a89fed348a08b1ffc6212

          SHA1

          30bccca119ff7116f3972a3ca89165907567dd3e

          SHA256

          d5cfc35df91f24babedeb9b04bbf0e6ef7505a7507bb668a7ca4125478b8fa9e

          SHA512

          ffbd479ca8b1cc45d03cf299fc27140809cad62a4700cb0dac23cca8cf58b9a6a5d3aaa3edc395b28d2c990ee9c0da9fb85b470d6df685329d18ce3720ef9e2f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187

          Filesize

          471B

          MD5

          d32b3937047776cc4f4d9e8ccad8985b

          SHA1

          a218b78f3a915bf624193ec038694799a14c3929

          SHA256

          efb292ab0f529c741d7d38b12bbb9cafc99763cacec8911892ec10b6a355648e

          SHA512

          fafee1eaad7ae3494cdfa1eb400b5bad7f04a58d8faf82d878cd4e2b2a725fb2470477a18dd9be8f4fcc0d430f15e6f5c4b461e305e64031cb6dbf44a53cc4b3

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A

          Filesize

          412B

          MD5

          f4bfbf0daab43526089bf480f8cb4ede

          SHA1

          c92464c93894641896dddac8ba24febc922cfbcf

          SHA256

          d1bd42e6bcc5e78c3c5ee725b6dd24d679bc37d0298bed76f2100bcc9a48423e

          SHA512

          dc744b08df594881d1a8931953f39a1ef04d08dbb65b72c01ecdb7f7c7dcccadeb3cccfdb9505b35c1af7f72540f4a5cdb09aa3598746c77877bea01124f9b61

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187

          Filesize

          412B

          MD5

          dba48effdb1bfe6125a37c7a9f6ffc75

          SHA1

          9d900ea6200cc0b08f23b0c38f7420417e0fe599

          SHA256

          fc480999e8642e7ebcd5423093d9bacfa681741c383753b50c895e77e7f6bef6

          SHA512

          a5dc8296d54fe836391900793dcab2167b61f7595623f935b77e3a475a48e6e4c461ca6f95f76bf9cc3554f226ddc65cb05ac9ddd2c35eab0d2df769d67e3457

        • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\Floodgate\Word.CampaignStates.json

          Filesize

          21B

          MD5

          f1b59332b953b3c99b3c95a44249c0d2

          SHA1

          1b16a2ca32bf8481e18ff8b7365229b598908991

          SHA256

          138e49660d259061d8152137abd8829acdfb78b69179890beb489fe3ffe23e0c

          SHA512

          3c1f99ecc394df3741be875fbe8d95e249d1d9ac220805794a22caf81620d5fdd3cce19260d94c0829b3160b28a2b4042e46b56398e60f72134e49254e9679a4

        • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\Floodgate\Word.GovernedChannelStates.json

          Filesize

          417B

          MD5

          c56ff60fbd601e84edd5a0ff1010d584

          SHA1

          342abb130dabeacde1d8ced806d67a3aef00a749

          SHA256

          200e8cc8dd12e22c9720be73092eafb620435d4569dbdcdba9404ace2aa4343c

          SHA512

          acd2054fddb33b55b58b870edd4eb6a3cdd3131dfe6139cb3d27054ac2b2a460694c9be9c2a1da0f85606e95e7f393cf16868b6c654e78a664799bc3418da86e

        • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\Floodgate\Word.Settings.json

          Filesize

          87B

          MD5

          e4e83f8123e9740b8aa3c3dfa77c1c04

          SHA1

          5281eae96efde7b0e16a1d977f005f0d3bd7aad0

          SHA256

          6034f27b0823b2a6a76fe296e851939fd05324d0af9d55f249c79af118b0eb31

          SHA512

          bd6b33fd2bbce4a46991bc0d877695d16f7e60b1959a0defc79b627e569e5c6cac7b4ad4e3e1d8389a08584602a51cf84d44cf247f03beb95f7d307fbba12bb9

        • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\Floodgate\Word.SurveyHistoryStats.json

          Filesize

          14B

          MD5

          6ca4960355e4951c72aa5f6364e459d5

          SHA1

          2fd90b4ec32804dff7a41b6e63c8b0a40b592113

          SHA256

          88301f0b7e96132a2699a8bce47d120855c7f0a37054540019e3204d6bcbaba3

          SHA512

          8544cd778717788b7484faf2001f463320a357db63cb72715c1395ef19d32eec4278bab07f15de3f4fed6af7e4f96c41908a0c45be94d5cdd8121877eccf310d

        • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.accdb

          Filesize

          512KB

          MD5

          51e63731013d75b3f6f8b4f7f6fb5f93

          SHA1

          fb6b4c32f749e750d83f080709fdf284dbdb65c9

          SHA256

          b407dd887d7edfc7c5d227ea189013f8c62cae5c733866d3f44918635a3c7b0d

          SHA512

          bee76b0ff32e87f23487bbd1d69d3341637a64706071aff0b00a1adf2bc64e3ebbeae0fc4d3e297ce7bd5f8bdc4a491a2bfc439272eaac88d07a5df6c1bf42eb

        • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.laccdb

          Filesize

          128B

          MD5

          f37c7e1c4fd58b8cb24caa9cc8d3ae9c

          SHA1

          89213a5bc1ffd59fc1cf36beeab5e519f0853257

          SHA256

          a3ed3e756c659a63de1205293cf82679df3c8503c2d1db4325ca83188e68acd3

          SHA512

          9444715b9a1c003612c2af34a4e2603409d21f6da8b1f6cb6c0f4bfb57ae3c204ef4597488d9e1246726f56efa5615e1711d012ee198f232a0cef7dc741eba97

        • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\765C3823-FA05-46B4-A120-92B50D85753D

          Filesize

          168KB

          MD5

          3d1368c24d741cdb5f4406a042cd1ad1

          SHA1

          71ddf570676b58dbc319fc487097dceab6bcb8e2

          SHA256

          51fcc78cf2f261238247b0dac2215f84f486f826b9f9d8f304873a891f3c22d8

          SHA512

          e9342f045c248efca5be226b0f7838ae74383f3a2ba69a50fa567ec6476abbec3a8babcad0f075ba47481e8ffb81296f697b31f2c7cacc345613ee52c2f62b4d

        • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

          Filesize

          321KB

          MD5

          edc5bbd89d21bff468e2b1bc6a6cad11

          SHA1

          b5a3588cc1c3274357eefae826f9de1876e4def4

          SHA256

          7c8ecd6695962fe29434fae9505f932f5f4b94196045cf6535566180ac50e0af

          SHA512

          57c5fb3a4bfbef6c6a9e2c1a8e3c00debec585c2e86857206c7f3ebd349b2436b9d9d6a6032ee0dc76cee44243766e4399cce9d0884abd2e47efb2b799d415f4

        • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\winword.exe_Rules.xml

          Filesize

          332KB

          MD5

          874e05073239ce46fb73138f72a0b502

          SHA1

          6c5cfb40cc141c26048fd1c06986983e21db47b0

          SHA256

          18200fdb493faadfd4016b59a77bd873212d3a12f6b01d01087c59e78b3ce0ed

          SHA512

          4650990457be788c226295023f4778a119777ee9716556a09f48f63238dcac72f9501776432cdb94f81de766414252f53c3006aae258e97199577baedbe68a58

        • C:\Users\Admin\AppData\Local\Microsoft\Office\DLP\mip\logs\mip_sdk.miplog

          Filesize

          19KB

          MD5

          15b44b0af00572692a2677db0644db25

          SHA1

          5451211cf23bed8e6835d62fb26a6a4c1dcf0dd7

          SHA256

          013fbc3350380c84f9bd5dfdf45358298f3a23e585d801257b7ed84da9addcbd

          SHA512

          6895743ee14badab9c3248bbf5cb893c2c6af87d7e7866d6dc610924d2d3353cb5fceb84debca39d8ec75330c41cfaae2bf51988a30e1177218b3f023bccbf91

        • C:\Users\Admin\AppData\Local\Microsoft\Office\OTele\excel.exe.db

          Filesize

          24KB

          MD5

          8665de22b67e46648a5a147c1ed296ca

          SHA1

          b289a96fee9fa77dd8e045ae8fd161debd376f48

          SHA256

          b5cbae5c48721295a51896f05abd4c9566be7941cda7b8c2aecb762e6e94425f

          SHA512

          bb03ea9347d302abf3b6fece055cdae0ad2d7c074e8517f230a90233f628e5803928b9ba7ba79c343e58dacb3e7a6fc16b94690a5ab0c71303959654a18bb5da

        • C:\Users\Admin\AppData\Local\Microsoft\Office\OTele\excel.exe.db-wal

          Filesize

          8KB

          MD5

          c79065d17e2c73529e80e8817a0af7a6

          SHA1

          d55413d615eca0221991fc6fbb60823c500d3d62

          SHA256

          5c2d65e65afb4a1ee79cc84deba807c6b0bdc9e98cdfa2830c2d77ee06dba0aa

          SHA512

          f0ae32047bd0a87b2a6d07e0446274961add0a5c956b4c524ea0e2380b48293b446f516f32788a52511406cb1d20aa3281cd5ce823a217279ddcfcd484cb32f3

        • C:\Users\Admin\AppData\Local\Microsoft\Office\OTele\winword.exe.db-wal

          Filesize

          8KB

          MD5

          1937b8eb30d4064fe82d92b5c3206316

          SHA1

          bfed51ab30d6d8936d041859d12f03831a59c2b1

          SHA256

          60f5794f1a6f6bd18d2f3a8ad30b4dad6cdcd0908eb9b0405622c4bb4ece01d6

          SHA512

          b7850ae4b7ab17b95283c65dd02023be414b326d0999197c1f8a7a23565f961b8e6c19d38d1c9b459dbb6c095a6a78d9d8265fd58a054d1dec5ae241f244c86b

        • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres

          Filesize

          2KB

          MD5

          0da143e4b3e63becedbc3168d8a8c38c

          SHA1

          771d24ca8b3716132a018c5dd9e1ccffc481f6f3

          SHA256

          46ef2f437bebd8e6a92a830465e87d86e37501c382f767cb2da64f826346fb64

          SHA512

          972f237e40cec8b8110cdf70e3412c2bea361705e00eca4ecaba0bf1aad07ef5ae76eb8b95551e18e25d8a2a835f967f5a8b4084817b4387fad181f8800f4f16

        • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbres

          Filesize

          2KB

          MD5

          b70bfd9a95bc1a99353fc52a9db7538e

          SHA1

          f1ac7cd68bf82485160aff33ed036e32fb179d96

          SHA256

          ab5f165658ea704bfabba728672ecbc9c4c49bfa81546c5a56d46904831c4deb

          SHA512

          156631381ff117b9d2fc4646944e1d034a39a34f03b0359d68e87458de4ab7e1ae855515988563de4e58f022c61c14c082ea3105de7a2a4c0455ad525acbaf72

        • C:\Users\Admin\AppData\Local\Temp\TCD7FB4.tmp\gb.xsl

          Filesize

          262KB

          MD5

          51d32ee5bc7ab811041f799652d26e04

          SHA1

          412193006aa3ef19e0a57e16acf86b830993024a

          SHA256

          6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

          SHA512

          5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

        • C:\Users\Admin\AppData\Local\Temp\VBE\MSForms.exd

          Filesize

          148KB

          MD5

          465054e9ea10615db8c6fe029152e165

          SHA1

          9b6f056ff5f6b192c42a2af507f58bf1ec7810fc

          SHA256

          565da7f9cd0d2d081cf9afc82fd0b6db3ab75074e3df95c31827707b9c3401fb

          SHA512

          2fb0030077034623d778f82098aa00470d8c9f0a376bef9c7ecca99a5542a0c7a5554481b7cc82f8c97dfb3f19279a6e744b8ba43e134f883e94426c84633de5

        • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

          Filesize

          2B

          MD5

          f3b25701fe362ec84616a93a45ce9998

          SHA1

          d62636d8caec13f04e28442a0a6fa1afeb024bbb

          SHA256

          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

          SHA512

          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

        • memory/1644-1558-0x00007FFE96FB0000-0x00007FFE96FC0000-memory.dmp

          Filesize

          64KB

        • memory/1644-1560-0x00007FFE96FB0000-0x00007FFE96FC0000-memory.dmp

          Filesize

          64KB

        • memory/1644-1561-0x00007FFE96FB0000-0x00007FFE96FC0000-memory.dmp

          Filesize

          64KB

        • memory/1644-1559-0x00007FFE96FB0000-0x00007FFE96FC0000-memory.dmp

          Filesize

          64KB

        • memory/2396-16-0x00007FFED6F30000-0x00007FFED7125000-memory.dmp

          Filesize

          2.0MB

        • memory/2396-11-0x00007FFED6F30000-0x00007FFED7125000-memory.dmp

          Filesize

          2.0MB

        • memory/2396-18-0x00007FFE94830000-0x00007FFE94840000-memory.dmp

          Filesize

          64KB

        • memory/2396-17-0x00007FFED6F30000-0x00007FFED7125000-memory.dmp

          Filesize

          2.0MB

        • memory/2396-10-0x00007FFED6F30000-0x00007FFED7125000-memory.dmp

          Filesize

          2.0MB

        • memory/2396-8-0x00007FFED6F30000-0x00007FFED7125000-memory.dmp

          Filesize

          2.0MB

        • memory/2396-7-0x00007FFED6F30000-0x00007FFED7125000-memory.dmp

          Filesize

          2.0MB

        • memory/2396-6-0x00007FFED6F30000-0x00007FFED7125000-memory.dmp

          Filesize

          2.0MB

        • memory/2396-575-0x00007FFED6F30000-0x00007FFED7125000-memory.dmp

          Filesize

          2.0MB

        • memory/2396-1568-0x00007FFED6F30000-0x00007FFED7125000-memory.dmp

          Filesize

          2.0MB

        • memory/2396-0-0x00007FFE96FB0000-0x00007FFE96FC0000-memory.dmp

          Filesize

          64KB

        • memory/2396-520-0x00007FFED6F30000-0x00007FFED7125000-memory.dmp

          Filesize

          2.0MB

        • memory/2396-15-0x00007FFE94830000-0x00007FFE94840000-memory.dmp

          Filesize

          64KB

        • memory/2396-12-0x00007FFED6F30000-0x00007FFED7125000-memory.dmp

          Filesize

          2.0MB

        • memory/2396-14-0x00007FFED6F30000-0x00007FFED7125000-memory.dmp

          Filesize

          2.0MB

        • memory/2396-13-0x00007FFED6F30000-0x00007FFED7125000-memory.dmp

          Filesize

          2.0MB

        • memory/2396-9-0x00007FFED6F30000-0x00007FFED7125000-memory.dmp

          Filesize

          2.0MB

        • memory/2396-1-0x00007FFE96FB0000-0x00007FFE96FC0000-memory.dmp

          Filesize

          64KB

        • memory/2396-2-0x00007FFE96FB0000-0x00007FFE96FC0000-memory.dmp

          Filesize

          64KB

        • memory/2396-3-0x00007FFE96FB0000-0x00007FFE96FC0000-memory.dmp

          Filesize

          64KB

        • memory/2396-4-0x00007FFE96FB0000-0x00007FFE96FC0000-memory.dmp

          Filesize

          64KB

        • memory/2396-5-0x00007FFED6FCD000-0x00007FFED6FCE000-memory.dmp

          Filesize

          4KB