Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    12/07/2024, 20:15

General

  • Target

    3ebbca4c968f0f1af577578d138b1fc3_JaffaCakes118.doc

  • Size

    34KB

  • MD5

    3ebbca4c968f0f1af577578d138b1fc3

  • SHA1

    9e4a16d772482fef406b3a47c7e48e294fb02681

  • SHA256

    12297ee7c41d47c2fdb58d49e89c6f3dd554a1a06bbb3c6f67af314c8a446272

  • SHA512

    d9810e85f575bbc604bfcdd2e019a75d5a70fd726bd0e61b9486a031fa2b6386fe06baaa233c9007f3130d71c0abcd5b640709c07716cf2009310f2ffc881bde

  • SSDEEP

    384:VbjknthR9o4DCiepR7A5CpS0uMMjvCrJXI4XC:Yq4uiejQE2Qhy

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 2 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\3ebbca4c968f0f1af577578d138b1fc3_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2568
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2744

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2568-0-0x000000002FE01000-0x000000002FE02000-memory.dmp

      Filesize

      4KB

    • memory/2568-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2568-2-0x000000007144D000-0x0000000071458000-memory.dmp

      Filesize

      44KB

    • memory/2568-5-0x000000007144D000-0x0000000071458000-memory.dmp

      Filesize

      44KB

    • memory/2568-11-0x00000000006F0000-0x00000000007F0000-memory.dmp

      Filesize

      1024KB

    • memory/2568-7-0x00000000006F0000-0x00000000007F0000-memory.dmp

      Filesize

      1024KB

    • memory/2568-19-0x00000000006F0000-0x00000000007F0000-memory.dmp

      Filesize

      1024KB

    • memory/2568-44-0x00000000006F0000-0x00000000007F0000-memory.dmp

      Filesize

      1024KB

    • memory/2568-18-0x00000000006F0000-0x00000000007F0000-memory.dmp

      Filesize

      1024KB

    • memory/2568-17-0x00000000006F0000-0x00000000007F0000-memory.dmp

      Filesize

      1024KB

    • memory/2568-16-0x00000000006F0000-0x00000000007F0000-memory.dmp

      Filesize

      1024KB

    • memory/2568-15-0x00000000006F0000-0x00000000007F0000-memory.dmp

      Filesize

      1024KB

    • memory/2568-14-0x00000000006F0000-0x00000000007F0000-memory.dmp

      Filesize

      1024KB

    • memory/2568-13-0x00000000006F0000-0x00000000007F0000-memory.dmp

      Filesize

      1024KB

    • memory/2568-12-0x00000000006F0000-0x00000000007F0000-memory.dmp

      Filesize

      1024KB

    • memory/2568-10-0x00000000006F0000-0x00000000007F0000-memory.dmp

      Filesize

      1024KB

    • memory/2568-48-0x00000000006F0000-0x00000000007F0000-memory.dmp

      Filesize

      1024KB

    • memory/2568-63-0x00000000006F0000-0x00000000007F0000-memory.dmp

      Filesize

      1024KB

    • memory/2568-9-0x00000000006F0000-0x00000000007F0000-memory.dmp

      Filesize

      1024KB

    • memory/2568-64-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2568-8-0x00000000006F0000-0x00000000007F0000-memory.dmp

      Filesize

      1024KB

    • memory/2568-32-0x00000000006F0000-0x00000000007F0000-memory.dmp

      Filesize

      1024KB

    • memory/2568-31-0x00000000006F0000-0x00000000007F0000-memory.dmp

      Filesize

      1024KB

    • memory/2568-65-0x000000007144D000-0x0000000071458000-memory.dmp

      Filesize

      44KB