Analysis

  • max time kernel
    101s
  • max time network
    102s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    09/07/2024, 05:48

General

  • Target

    2f3039d152bc7b16e38936baf1f305ca_JaffaCakes118.docm

  • Size

    166KB

  • MD5

    2f3039d152bc7b16e38936baf1f305ca

  • SHA1

    ef393e5da9bc190783234fee92afcd29e40a49d7

  • SHA256

    7bca68f07452156848a09f32b0f46bf8156682cbd6fa442003b61d180923f331

  • SHA512

    c80c04ea6bc7f6dcb7d45909f9a75a6de489269eac5a81f43edb598b2bf0e26571857ccf015090bc5146f45e133db2aca955b0cd550fc0bd647a1a49a2b23558

  • SSDEEP

    3072:TS1XRJHB2yrlqx1Jxh3Sc7g2QhjsDhroHFNyJkc67dGTZVsaqJ:TmXReuGJ3ZsyV8HTOkwZVsx

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2f3039d152bc7b16e38936baf1f305ca_JaffaCakes118.docm"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:448
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1280

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{F3A7C492-43BF-4C2E-8A68-93414EBA2ABA}.FSD

            Filesize

            128KB

            MD5

            a885e4bd21f98a5440a404e2269b03d3

            SHA1

            cbfcf7e6b308d3164eb5a572bbfdf2a4c7db6912

            SHA256

            a6b6982ade979c77680c739c4d4a7764231b0a0163a21a6ca35bd64a1d9804d6

            SHA512

            2a82900fdb779fe487f256d6dd508739e407cb58cb178d05527d0e8a92b14d3562887e681f87afb154a541ac529554d9bbc5a1fde3afa946ce8ae5088eb1c195

          • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

            Filesize

            128KB

            MD5

            256c93f6aa123e274b329da75fd59466

            SHA1

            50adb79192c573a9abf7ce07265025b2757c4863

            SHA256

            bbb1fc4332f91d5b3e28c27b5291780d47e6aae8837be0c4a9665942ecd2d2b4

            SHA512

            3b27474e2daa0678ae834fb7a18a3d70b25a61cd00c4129635d943937c1043bc68391a224f9f62302ab5995bc56f2ddd6fcd8e504c08bd1f49c892cb83c15abc

          • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{AA968FC2-EE32-4051-AD4B-86B241AF5FEF}.FSD

            Filesize

            128KB

            MD5

            a05a77fd9830e707d8a94c9c593818a4

            SHA1

            30eaa5dc0c06031edc9cbd2295b3f74dac321bc0

            SHA256

            54a1f5dcf2de6c1c7518ebd1551e26a23c59b7ccbc09d92c3d0f8e3767732a88

            SHA512

            169e87fbc9501c4de358a1f055bbb4940ae4e02a4707b92c75c6d4c8563b63707c4fd70d2fcd2b03f7e87f40c5d6bad4d37a739aebedd8d0b455a4710e1c946c

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5J67VDZD\39[1].htm

            Filesize

            114B

            MD5

            e89f75f918dbdcee28604d4e09dd71d7

            SHA1

            f9d9055e9878723a12063b47d4a1a5f58c3eb1e9

            SHA256

            6dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023

            SHA512

            8df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0

          • C:\Users\Admin\AppData\Local\Temp\{74CD8D11-DD4A-42B0-8863-3AF032BE32D5}

            Filesize

            128KB

            MD5

            61bb3103b80af9aaaeb4c51d889faa12

            SHA1

            c9a51219f4a8a3736c9840a073a74a75b467b87c

            SHA256

            428aaee7449c97d49d31279c6d1a0d00cdb638569ef190b86e5579be4e7df557

            SHA512

            d595d7308e2533437d449b73991c95a2e05aa1619002f3992cc7154b4e6d65add0c570b082a28e199f70866f7f437ef75d0edab04fe4cf14b39f26fc7650d5c2

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            19KB

            MD5

            763a8307acaaf9bbc07f72c80df96295

            SHA1

            91954f25192774e102b81cba0ffc15ded0ad79f8

            SHA256

            2fef0e7f233a16d8a6a2fe4e8f930a17c0b3b2f4760da10066a45278ea61346a

            SHA512

            50f141420edb084cb7e0a5fadd0329a3d223a3dccd6b9ff119a0538ecd6e593be107137bb95a29b8ef33ca3c254b96f50684fdbdcbeefafd4d5fe2ad25545f2e

          • memory/448-0-0x000000002F3F1000-0x000000002F3F2000-memory.dmp

            Filesize

            4KB

          • memory/448-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/448-2-0x00000000715FD000-0x0000000071608000-memory.dmp

            Filesize

            44KB

          • memory/448-82-0x00000000715FD000-0x0000000071608000-memory.dmp

            Filesize

            44KB

          • memory/448-111-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/448-112-0x00000000715FD000-0x0000000071608000-memory.dmp

            Filesize

            44KB