Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 22:03
Static task
static1
Behavioral task
behavioral1
Sample
691ea1f99ccaffa5925d8a49a99a4aea_JaffaCakes118.docm
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
691ea1f99ccaffa5925d8a49a99a4aea_JaffaCakes118.docm
Resource
win10v2004-20240709-en
General
-
Target
691ea1f99ccaffa5925d8a49a99a4aea_JaffaCakes118.docm
-
Size
177KB
-
MD5
691ea1f99ccaffa5925d8a49a99a4aea
-
SHA1
cde8f0eb8f4276c642801f947ca0e7a7e90fa8f5
-
SHA256
e80140e3ce49abe4fd22db5b5645d0f3e2fc76dd91e2c32c80d6327a73517b65
-
SHA512
35d1d20293524efe746ba28e7f5f796a3ec9efd41cad42f626ba0ccf00528562ec8e73a2d922e46cb381391e6a309708f5628510dfa484f542dc17fb81b2b3e1
-
SSDEEP
3072:6w8X8ZeQ91dXGHdOnzDX9xWdygjqS1XRJHB2yrlqx1Jxh3Sc7g2QhECGf:Y8QQ9XXFnzpxBmXReuGJ3ZshGf
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\http:\bit.ly\laodinfokqaw WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2244 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2244 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2244 WINWORD.EXE 2244 WINWORD.EXE 2244 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2088 2244 WINWORD.EXE 30 PID 2244 wrote to memory of 2088 2244 WINWORD.EXE 30 PID 2244 wrote to memory of 2088 2244 WINWORD.EXE 30 PID 2244 wrote to memory of 2088 2244 WINWORD.EXE 30
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\691ea1f99ccaffa5925d8a49a99a4aea_JaffaCakes118.docm"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{176ACC80-8894-4165-A663-89B8704724D8}.FSD
Filesize128KB
MD52c940c9d42f82a26b3fd0c2091ba6a00
SHA1afffebf9df659f14bc44d688cf4f5a90dd06d65b
SHA25682f6f75c5af49542d70058db570cafa6991ef37f643d36d6dfdee1c6508a4a22
SHA5124fa6aa92b7b17be6ec22bdbb69383fa6b0d7a76b657ce5820b260147113ec267959913c5c1d88ff96d07046e0ecc16d1f4720a5b6b64df3061cfe2dd453265ea
-
C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
Filesize128KB
MD569e746edc65e11321f02a8a5c81c3bfa
SHA17aba26d18f95f6eece5ede1a0abac2ac64dcbf15
SHA256ab145b95d49dcbb13fd88370e929ff1dbda26e4c7f6c95b46b48742c5253884b
SHA512053b9b48522454dfa82cfbf68bd541b84a9111800229830996848f7f2cf5bb066f5960a43c461d38e3e7579d1b6e20bd4fbb7f084a9ed344188466d22991d9a2
-
C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{DE6BEEBF-7D82-4E3D-8C16-3F2AA9CC5595}.FSD
Filesize128KB
MD59db045ec90b50884577668c8c39a881e
SHA1e5086d5d3a624f9272b8fc78e960b0349175bd24
SHA256a99a0ee2a2a4ca1f5eb5cb8d2db647b905c2773646d69f7fcb7ddd7d51478451
SHA512d77cad17edf575d6a329a8b5a10fcb18c09d9dfcb5a28e9eb55f0c00ed2f3b1b1e68737c5fb5d02d07296cab1343a78c69d1927a5cc5f102a38bd867ae3bc28a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KJ834MBR\laodinfokqaw[1].htm
Filesize5KB
MD51c26151c43feaaaa84343fd2d0b5e1e5
SHA169d0bf4c5d8c4ba4adcd416a221e8f6d0ea76d1c
SHA256239e6159fbd31bf808d9d30b5154370d7a1b2f54fc8c8c6b86992bb924a10ee7
SHA5127cffbeb76d5019c71487dd153e3c91b2afd114e533372e27934147bdc50d1c8b5293024c42ca653aa975644d68aa9b594a2049ea4c7ca83d4bf6e39b9c80c416
-
Filesize
128KB
MD50bf8d827a5a99458e40062e4b2a0e9d3
SHA1254d9409d36d27ff0696cec54f8c175f23d3286c
SHA256b935306ee236c2e9a1a921577b8b75d5e16fd980d44f34a2e6f86bf28d55c12d
SHA5126561bf0feab34e237f712bbc451ff4ad943f5743fef7425bc557138cac7a227c255b428cf09650f34ddf1b792aa6756b6e39cf5c908d95d247bc5672678e973a
-
Filesize
19KB
MD57c9baf8d24753eac632b29ee814834a6
SHA1327c4b62122e59ff3b7251666b81b49b6e6d2e02
SHA2565fe2c29d6a2884a8f1fa50ede25af4cc0bcb50afdb99a9345bf87e894c3b6e41
SHA5122d652bf2d252fb34e599782b0a1681fc6b2550211eec086a2526597c7062bc2a372eb9986aef11419ecd9f38eb5100fcbb7d90d6b030c4a1615c212b73722399