Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19/07/2024, 18:20

General

  • Target

    5d1e68ff409187a7735d50ef2fe1ea52_JaffaCakes118.doc

  • Size

    32KB

  • MD5

    5d1e68ff409187a7735d50ef2fe1ea52

  • SHA1

    ebde9895108204cd2490e63ada9d5fe40f4598f2

  • SHA256

    5db93f249352d68e707ebb1b7b289b20b4c84cd27adc9ca9b622351c4563a69b

  • SHA512

    789a2c3ddab0def7198a7bbbf13bd134d52732a04535fd8d69e80d5c553bfec87c433a18250db73d8cb132fc1810c0b4ab2d49875e20de66b50aff8e432b7217

  • SSDEEP

    384:i3tUAtB+zlSodBLP1U7WoDJwMtMj1ohxf:Ct9Topi2

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\5d1e68ff409187a7735d50ef2fe1ea52_JaffaCakes118.doc"
    1⤵
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2640
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2816
    • C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" -Embedding
      1⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2824

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

            Filesize

            240KB

            MD5

            ffb9cbb8de51c115fbbdc6bf1fe88e22

            SHA1

            31362f86e0bc5581b61b282fd91d09a9e0f3404d

            SHA256

            ac7908bf64cc0ca8212266b1c0cc86983e54c35c5c53a1b0c09365ba76b0d8f8

            SHA512

            a9a9740d60d698555b8fef0ac052286d2c82c1d9e83e49853b5050b41400b078bd48616f66d99b8b40358dfc57d1bf250d1dfd0794adca006a4ebe5079043302

          • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

            Filesize

            240KB

            MD5

            79b6225f98c8fe0bd80a9344a34894f2

            SHA1

            dc06339390f5583c52e62231a71aec3ed8c7da77

            SHA256

            2af9f5df2f8a6a6d5164c9c19bc251efdfced2019bfc1499fc353abbdaa12cc9

            SHA512

            c791bc093f2ef7d6a046c271167c33b60e065fc8302c26a309b8d86ebec4d902adad02a1268cce85dd7ddc47c5f694b89120a07655c76ccd0ff4294b4b50be49

          • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

            Filesize

            1KB

            MD5

            48dd6cae43ce26b992c35799fcd76898

            SHA1

            8e600544df0250da7d634599ce6ee50da11c0355

            SHA256

            7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

            SHA512

            c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

          • memory/2640-7-0x00000000006D0000-0x00000000007D0000-memory.dmp

            Filesize

            1024KB

          • memory/2640-6-0x00000000006D0000-0x00000000007D0000-memory.dmp

            Filesize

            1024KB

          • memory/2640-5-0x00000000006D0000-0x00000000007D0000-memory.dmp

            Filesize

            1024KB

          • memory/2640-0-0x000000002FF11000-0x000000002FF12000-memory.dmp

            Filesize

            4KB

          • memory/2640-2-0x00000000712FD000-0x0000000071308000-memory.dmp

            Filesize

            44KB

          • memory/2640-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2640-138-0x00000000712FD000-0x0000000071308000-memory.dmp

            Filesize

            44KB

          • memory/2640-139-0x00000000006D0000-0x00000000007D0000-memory.dmp

            Filesize

            1024KB

          • memory/2824-13-0x00000000712FD000-0x0000000071308000-memory.dmp

            Filesize

            44KB

          • memory/2824-140-0x00000000712FD000-0x0000000071308000-memory.dmp

            Filesize

            44KB