Analysis

  • max time kernel
    129s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    08/07/2024, 04:11

General

  • Target

    2aef30810ecaa6c42593c3bcdca84127_JaffaCakes118.doc

  • Size

    38KB

  • MD5

    2aef30810ecaa6c42593c3bcdca84127

  • SHA1

    c4ed182abeaefad9e0a329c4355650cff627e148

  • SHA256

    639810142c71270ad1203f15b68cbd1d21dead284d075fffbcfd716b7356e939

  • SHA512

    3e7659dc775b4a53f7c45943fa9f337011880c96e3658c9de4ae5e3d1923b569d5c8198f3878ac946e7d9a920ffad33195468f348bd898c63341ec4d75bb0056

  • SSDEEP

    384:C0JhStUNALnvwozcmLVEW0JdPqsmJn/lz64Mjewo0WD:xvodLVEW6d1kntA6

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 3 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2aef30810ecaa6c42593c3bcdca84127_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1180
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1768

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\system\kotov.sys

      Filesize

      6KB

      MD5

      703d3a0619a5aa994fac61e52d6709a8

      SHA1

      79856563095ab657c77e4eed8546716cc2eae59b

      SHA256

      6b0d97f71d1f461c76d8ca884e2816f380d936218c5fe372e89c4c3f3ad13a0d

      SHA512

      43909375d3ef638c50a1463708dd13c791c13e3c41a902d45f9a539a617a018514a5d8e6940ecc89c5c06cda885fe59f7d32ee274ee26e6ce9a1173f91c334f4

    • memory/1180-0-0x000000002F5F1000-0x000000002F5F2000-memory.dmp

      Filesize

      4KB

    • memory/1180-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1180-2-0x0000000071A2D000-0x0000000071A38000-memory.dmp

      Filesize

      44KB

    • memory/1180-48-0x0000000005E80000-0x0000000005F80000-memory.dmp

      Filesize

      1024KB

    • memory/1180-47-0x0000000005E80000-0x0000000005F80000-memory.dmp

      Filesize

      1024KB

    • memory/1180-107-0x0000000005E80000-0x0000000005F80000-memory.dmp

      Filesize

      1024KB

    • memory/1180-109-0x0000000005E80000-0x0000000005F80000-memory.dmp

      Filesize

      1024KB

    • memory/1180-108-0x0000000005E80000-0x0000000005F80000-memory.dmp

      Filesize

      1024KB

    • memory/1180-128-0x0000000071A2D000-0x0000000071A38000-memory.dmp

      Filesize

      44KB

    • memory/1180-129-0x0000000005E80000-0x0000000005F80000-memory.dmp

      Filesize

      1024KB

    • memory/1180-130-0x0000000005E80000-0x0000000005F80000-memory.dmp

      Filesize

      1024KB