Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-06-2024 17:15

General

  • Target

    0ee3fd78f9b1fa4a91e934b88a7d43e6_JaffaCakes118.doc

  • Size

    36KB

  • MD5

    0ee3fd78f9b1fa4a91e934b88a7d43e6

  • SHA1

    d9482fd4e6998e5f288a3ac6a8578cceab7156c4

  • SHA256

    ae2641920db2a85dbc84be47368d48a8e158d690d6277c605b97197dd243fe11

  • SHA512

    24ae653a864cf03ac565fd490adfd9a569f98afcd9fc9316ae354bd956b18ef1c70d604c8bee4d9bb48af05e39d21b6a3f1cf4b2a64e7affa5059135191d2a2e

  • SSDEEP

    384:YEQUkwHXlmRL5dBOAjTjfq4eu8olz0mO3UO3sjj3at7I41:g8mRl/jTjyAOmN3o

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0ee3fd78f9b1fa4a91e934b88a7d43e6_JaffaCakes118.doc"
    1⤵
    • Deletes itself
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:564

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\0ee3fd78f9b1fa4a91e934b88a7d43e6_JaffaCakes118.doc

      Filesize

      39KB

      MD5

      d311c8a0ad28f8e46c8b32b1398f36b9

      SHA1

      b38a0a155f94950686a626fae100eea009638c8d

      SHA256

      fd451a555f914aa60d05b24c3f6841ff2590b15edb6832132691f41380fa25ff

      SHA512

      c3c5d84c4eca343abf4a4e72cfafcf1726c1c45110c099ac275f235974845667b30a47f8a24b060c6f20757b54e748006e61d9d338ac126db1bd5503fcb2a21b

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      29KB

      MD5

      1ff0d01341bb54f5bf900fc05065b954

      SHA1

      4193f3e646139d0c9a611aec833927db0a94fc8f

      SHA256

      d81d998737d3d221ca512e05a1b210f24399b3cf7ffd804c94a37413e9cb4e8f

      SHA512

      7d95f7182523dba7c0f215e57b26e60d24cdb17a7421a22590ead11f5c835774eaf92ff3e89019216a83b567450ec8da6de90a24109d9ee3340d655341b6bff0

    • memory/2104-8-0x00000000004A0000-0x00000000005A0000-memory.dmp

      Filesize

      1024KB

    • memory/2104-20-0x00000000004A0000-0x00000000005A0000-memory.dmp

      Filesize

      1024KB

    • memory/2104-12-0x00000000004A0000-0x00000000005A0000-memory.dmp

      Filesize

      1024KB

    • memory/2104-10-0x00000000004A0000-0x00000000005A0000-memory.dmp

      Filesize

      1024KB

    • memory/2104-11-0x00000000004A0000-0x00000000005A0000-memory.dmp

      Filesize

      1024KB

    • memory/2104-9-0x00000000004A0000-0x00000000005A0000-memory.dmp

      Filesize

      1024KB

    • memory/2104-0-0x000000002FCB1000-0x000000002FCB2000-memory.dmp

      Filesize

      4KB

    • memory/2104-6-0x00000000004A0000-0x00000000005A0000-memory.dmp

      Filesize

      1024KB

    • memory/2104-19-0x000000007198D000-0x0000000071998000-memory.dmp

      Filesize

      44KB

    • memory/2104-7-0x00000000004A0000-0x00000000005A0000-memory.dmp

      Filesize

      1024KB

    • memory/2104-23-0x00000000004A0000-0x00000000005A0000-memory.dmp

      Filesize

      1024KB

    • memory/2104-22-0x00000000004A0000-0x00000000005A0000-memory.dmp

      Filesize

      1024KB

    • memory/2104-21-0x00000000004A0000-0x00000000005A0000-memory.dmp

      Filesize

      1024KB

    • memory/2104-24-0x00000000004A0000-0x00000000005A0000-memory.dmp

      Filesize

      1024KB

    • memory/2104-2-0x000000007198D000-0x0000000071998000-memory.dmp

      Filesize

      44KB

    • memory/2104-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2104-47-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB