Overview
overview
7Static
static
7304fa7a27e...18.exe
windows7-x64
7304fa7a27e...18.exe
windows10-2004-x64
7$PLUGINSDI...if.dll
windows7-x64
3$PLUGINSDI...if.dll
windows10-2004-x64
3$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...os.dll
windows7-x64
3$PLUGINSDI...os.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$PLUGINSDI...ay.dll
windows7-x64
7$PLUGINSDI...ay.dll
windows10-2004-x64
7$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$TEMP/instloffer.exe
windows7-x64
3$TEMP/instloffer.exe
windows10-2004-x64
3$TEMP/license.rtf
windows7-x64
4$TEMP/license.rtf
windows10-2004-x64
1Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 12:08
Behavioral task
behavioral1
Sample
304fa7a27e0e3e80696e6603af4485e6_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
304fa7a27e0e3e80696e6603af4485e6_JaffaCakes118.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/AnimGif.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/AnimGif.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/BgWorker.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/BgWorker.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/ExecDos.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/ExecDos.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsArray.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsArray.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral19
Sample
$TEMP/instloffer.exe
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
$TEMP/instloffer.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral21
Sample
$TEMP/license.rtf
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
$TEMP/license.rtf
Resource
win10v2004-20240704-en
General
-
Target
$TEMP/license.rtf
-
Size
24KB
-
MD5
4235aed30c8e4241514b0ea2f0ef3458
-
SHA1
6c14c849a4212ff5a0972889afca9aad6d6fe460
-
SHA256
ded8d042e3c1c153a29dee5ee2f6d1f203c4984a52f12bc7e01cfc85b85c48aa
-
SHA512
9443a5a8b96f467f0677dee5da311e30eb763f82fdc11ac12ab0781864a11b72748d0740cbdbc5c0d17bf97de12902aa57d29bb5dc23df660489f727e71f0158
-
SSDEEP
384:OyU8jHYBAvr0QJes4Kza5rSOPKlL1y1S3pwD5vqEUFMIZFxy:G87YBAT0QJeVKzatSOPaJn3pwD09Jy
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2192 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2192 WINWORD.EXE 2192 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2432 2192 WINWORD.EXE 32 PID 2192 wrote to memory of 2432 2192 WINWORD.EXE 32 PID 2192 wrote to memory of 2432 2192 WINWORD.EXE 32 PID 2192 wrote to memory of 2432 2192 WINWORD.EXE 32
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\$TEMP\license.rtf"1⤵
- Drops file in Windows directory
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2432
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD519ab749adb2511eb6f3317a2a09f310c
SHA1012da4c8f8c238394ce8231726b035be445c93fc
SHA256ae605d6d966d4797add74619348a1b5d2a590a28822cb2dfa451740bfd0f4d8b
SHA512e156babded5be7baf7f68062968cb4ee2a211babba251546d6def1482ae2e88ec061cdbbffb1be6dc05b0333eb5e91228a077dd9d419906ad2953d81f748592b