Malware Analysis Report

2025-01-22 19:12

Sample ID 240724-flmmmssdlb
Target 6a51e95ee504da80a3aee41ac5b72946_JaffaCakes118
SHA256 523a015e5c32f58ffde514145402e3bd4487e72aba937cfcea78b50857e6075d
Tags
macro macro_on_action discovery
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

523a015e5c32f58ffde514145402e3bd4487e72aba937cfcea78b50857e6075d

Threat Level: Likely malicious

The file 6a51e95ee504da80a3aee41ac5b72946_JaffaCakes118 was found to be: Likely malicious.

Malicious Activity Summary

macro macro_on_action discovery

Office macro that triggers on suspicious action

Suspicious Office macro

Abuses OpenXML format to download file from external location

Drops file in Windows directory

System Location Discovery: System Language Discovery

Office loads VBA resources, possible macro or embedded object present

Modifies registry class

Suspicious use of AdjustPrivilegeToken

Checks processor information in registry

Suspicious behavior: AddClipboardFormatListener

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Enumerates system info in registry

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-07-24 04:57

Signatures

Office macro that triggers on suspicious action

macro macro_on_action
Description Indicator Process Target
N/A N/A N/A N/A

Suspicious Office macro

macro
Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-07-24 04:57

Reported

2024-07-24 05:00

Platform

win7-20240705-en

Max time kernel

148s

Max time network

137s

Command Line

"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\6a51e95ee504da80a3aee41ac5b72946_JaffaCakes118.doc"

Signatures

Abuses OpenXML format to download file from external location

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key opened \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Office\Common\Offline\Files\https://dailyemploy.com/day.php?D1LjcSF5jb82A5dbwI5hANPYSbHasYlz:WL956303 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\Debug\WIA\wiatrace.log C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Office loads VBA resources, possible macro or embedded object present

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\TypeLib\{F8897282-7EAB-450C-A42C-3487BAE5B05D}\2.0\0 C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Interface\{BEF6E003-A874-101A-8BBA-00AA00300CAB}\ = "Font" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Interface\{82B02372-B5BC-11CF-810F-00A0C9030074}\ = "IReturnString" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Wow6432Node\Interface\{5512D115-5CC6-11CF-8D67-00AA00BDCE1D} C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Interface\{8BD21D32-EC42-11CE-9E0D-00AA006002F3}\ = "MdcComboEvents" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Wow6432Node\Interface\{8BD21D62-EC42-11CE-9E0D-00AA006002F3} C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F8897282-7EAB-450C-A42C-3487BAE5B05D}\2.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\VBE" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\TypeLib\{F8897282-7EAB-450C-A42C-3487BAE5B05D}\2.0 C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Wow6432Node\Interface\{04598FC8-866C-11CF-AB7C-00AA00C08FCF} C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Wow6432Node\Interface\{8BD21D12-EC42-11CE-9E0D-00AA006002F3} C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Interface\{8BD21D12-EC42-11CE-9E0D-00AA006002F3}\ = "MdcTextEvents" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Wow6432Node\Interface\{8BD21D42-EC42-11CE-9E0D-00AA006002F3} C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Interface\{8BD21D42-EC42-11CE-9E0D-00AA006002F3} C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Interface\{8BD21D52-EC42-11CE-9E0D-00AA006002F3} C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Interface\{47FF8FE5-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents6" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Wow6432Node\Interface\{BEF6E003-A874-101A-8BBA-00AA00300CAB}\ = "Font" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Wow6432Node\Interface\{5512D117-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLCheckbox" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Interface\{47FF8FE4-6198-11CF-8CE8-00AA006CB389} C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Wow6432Node\Interface\{47FF8FE9-6198-11CF-8CE8-00AA006CB389} C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Interface\{82B02372-B5BC-11CF-810F-00A0C9030074} C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Interface\{04598FC7-866C-11CF-AB7C-00AA00C08FCF}\ = "Controls" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Interface\{8BD21D23-EC42-11CE-9E0D-00AA006002F3} C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Wow6432Node\Interface\{04598FC2-866C-11CF-AB7C-00AA00C08FCF} C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Wow6432Node\Interface\{8BD21D43-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcCheckBox" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Wow6432Node\Interface\{4C599243-6926-101B-9992-00000B65C6F9} C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Wow6432Node\Interface\{04598FC4-866C-11CF-AB7C-00AA00C08FCF} C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Wow6432Node\Interface\{8BD21D23-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcList" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Wow6432Node\Interface\{5512D111-5CC6-11CF-8D67-00AA00BDCE1D} C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Interface\{A38BFFC3-A5A0-11CE-8107-00AA00611080}\ = "Tab" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Interface\{5512D11F-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLPassword" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\TypeLib\{F8897282-7EAB-450C-A42C-3487BAE5B05D}\2.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\VBE\\MSForms.exd" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Interface\{29B86A70-F52E-11CE-9BCE-00AA00608E01}\ = "IOptionFrame" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Interface\{8BD21D33-EC42-11CE-9E0D-00AA006002F3} C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Interface\{5512D115-5CC6-11CF-8D67-00AA00BDCE1D} C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Interface\{796ED650-5FE9-11CF-8D68-00AA00BDCE1D}\ = "WHTMLControlEvents" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F8897282-7EAB-450C-A42C-3487BAE5B05D} C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Interface\{EC72F590-F375-11CE-B9E8-00AA006B1A69} C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Wow6432Node\Interface\{8BD21D23-EC42-11CE-9E0D-00AA006002F3} C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Interface\{8BD21D43-EC42-11CE-9E0D-00AA006002F3} C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Wow6432Node\Interface\{5512D119-5CC6-11CF-8D67-00AA00BDCE1D} C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Wow6432Node\Interface\{7B020EC1-AF6C-11CE-9F46-00AA00574A4F} C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Interface\{92E11A03-7358-11CE-80CB-00AA00611080} C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Wow6432Node\Interface\{7B020EC8-AF6C-11CE-9F46-00AA00574A4F} C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F8897282-7EAB-450C-A42C-3487BAE5B05D}\2.0\ = "Microsoft Forms 2.0 Object Library" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\TypeLib\{F8897282-7EAB-450C-A42C-3487BAE5B05D}\2.0\HELPDIR C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Interface\{9A4BBF53-4E46-101B-8BBD-00AA003E3B29}\ = "ControlEvents" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Interface\{04598FC1-866C-11CF-AB7C-00AA00C08FCF} C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Wow6432Node\Interface\{4C599243-6926-101B-9992-00000B65C6F9}\ = "IImage" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Wow6432Node\Interface\{5512D11B-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLText" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Wow6432Node\Interface\{5512D11F-5CC6-11CF-8D67-00AA00BDCE1D} C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Wow6432Node\Interface\{04598FC3-866C-11CF-AB7C-00AA00C08FCF} C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Interface\{A38BFFC3-A5A0-11CE-8107-00AA00611080} C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Interface\{7B020EC1-AF6C-11CE-9F46-00AA00574A4F} C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Wow6432Node\Interface\{5B9D8FC8-4A71-101B-97A6-00000B65C08B} C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Wow6432Node\Interface\{CF3F94A0-F546-11CE-9BCE-00AA00608E01} C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Wow6432Node\Interface\{8BD21D53-EC42-11CE-9E0D-00AA006002F3} C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Wow6432Node\Interface\{944ACF93-A1E6-11CE-8104-00AA00611080}\ = "Tabs" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Wow6432Node\Interface\{5512D119-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLOption" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Interface\{8BD21D12-EC42-11CE-9E0D-00AA006002F3} C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Interface\{8BD21D42-EC42-11CE-9E0D-00AA006002F3}\ = "MdcCheckBoxEvents" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Wow6432Node\Interface\{79176FB2-B7F2-11CE-97EF-00AA006D2776}\ = "SpinbuttonEvents" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Interface\{47FF8FE0-6198-11CF-8CE8-00AA006CB389} C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Interface\{47FF8FE3-6198-11CF-8CE8-00AA006CB389} C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Wow6432Node\Interface\{47FF8FE9-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents10" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A

Processes

C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE

"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\6a51e95ee504da80a3aee41ac5b72946_JaffaCakes118.doc"

C:\Windows\splwow64.exe

C:\Windows\splwow64.exe 12288

C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE

"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding

Network

Country Destination Domain Proto
US 8.8.8.8:53 dailyemploy.com udp
US 52.86.6.113:443 dailyemploy.com tcp
US 3.94.41.167:443 dailyemploy.com tcp

Files

memory/3016-0-0x000000002F971000-0x000000002F972000-memory.dmp

memory/3016-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

memory/3016-2-0x000000007142D000-0x0000000071438000-memory.dmp

memory/3016-9-0x000000007142D000-0x0000000071438000-memory.dmp

memory/3016-11-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-13-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-12-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-19-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-57-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-61-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-60-0x000000000F770000-0x000000000F870000-memory.dmp

memory/3016-59-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-56-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-55-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-54-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-53-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-52-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-51-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-49-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-48-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-47-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-46-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-44-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-43-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-42-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-41-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-40-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-39-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-37-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-35-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-32-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-31-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-30-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-29-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-58-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-27-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-26-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-25-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-24-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-23-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-22-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-20-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-18-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-17-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-16-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-15-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-14-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-50-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-45-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-38-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-36-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-34-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-33-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-28-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-21-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-515-0x00000000003B0000-0x00000000004B0000-memory.dmp

memory/3016-516-0x000000000F770000-0x000000000F870000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\{F22E454B-6546-401A-A8E6-B9391DEA7B1A}

MD5 7f6952ec9af37e9286dfd8e38204616d
SHA1 57ef33135b96b1e47ab9e98ac0330b6efc49a057
SHA256 91aebd0ff6f92ae3b1c21f70231d8980ef26773a2b1f2caef12a7b3f0e62b361
SHA512 66f520f6cc7a2fa38d8714e640c78b27a691257cd4c527675987cb079cbb9ff17490327306b63c60d4a4102f8645f16a7e8301f375886769c762532cf3f68822

C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

MD5 d2bc3fde3bb5a54d76770875c4c3986b
SHA1 7ee1b31b4e14d3988f6280a1942d1008a4737e48
SHA256 4dd6c5f523d67082578936818c18d18884fbe0e0345f46074904095a79a6e0bd
SHA512 89c577d4d080abcf999f1e4f604ea1b61c32c309de3e5ce005872dd9305c1170701348e8a8fba5317f8033db71dda61f8d71d7bfc66f892dd69900807b16489e

C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

MD5 db3986d8c9750a655026226a68baa8eb
SHA1 d380daf62c514474d801c744a58d92a29fd4460b
SHA256 59824508eb81950d2ad4ea3100905b362f51aa9b701fba060054a5dd93a63334
SHA512 361d0106cef3e49f18d0fdebfa40f84c708e39acdb329b57658c60f3e41a97b405ef234dca1462916da00549020f38825e8017952aca7f15ea71a95852768f98

C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{AE2A7B16-B505-46AF-A1C2-FF4BAAA7F130}.FSD

MD5 b0075a511e6373d30634571df52da083
SHA1 e58f6172974c52341e1985884a97ba193006fc1d
SHA256 06bb616eef1b4e3b9e2d9d7303f781522a20602671047ae107f3de61085b9613
SHA512 16e380ad36cd2fe96155e8254138a93df7f01f41b370ed7648c5091359c840b4d4413a2fe3fb1f6731aaa59bfc1a27faa365ca2395bbb78bab827c0d1d90045d

Analysis: behavioral2

Detonation Overview

Submitted

2024-07-24 04:57

Reported

2024-07-24 05:00

Platform

win10v2004-20240709-en

Max time kernel

146s

Max time network

151s

Command Line

"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\6a51e95ee504da80a3aee41ac5b72946_JaffaCakes118.doc" /o ""

Signatures

Checks processor information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE N/A
Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE N/A
Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE N/A
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeAuditPrivilege N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Processes

C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE

"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\6a51e95ee504da80a3aee41ac5b72946_JaffaCakes118.doc" /o ""

C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding

Network

Country Destination Domain Proto
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 roaming.officeapps.live.com udp
NL 52.109.89.19:443 roaming.officeapps.live.com tcp
US 8.8.8.8:53 240.76.109.52.in-addr.arpa udp
US 8.8.8.8:53 19.89.109.52.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 169.117.168.52.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 metadata.templates.cdn.office.net udp
GB 2.16.167.138:443 metadata.templates.cdn.office.net tcp
US 8.8.8.8:53 binaries.templates.cdn.office.net udp
GB 173.222.211.49:443 binaries.templates.cdn.office.net tcp
GB 173.222.211.49:443 binaries.templates.cdn.office.net tcp
GB 173.222.211.49:443 binaries.templates.cdn.office.net tcp
GB 173.222.211.49:443 binaries.templates.cdn.office.net tcp
GB 173.222.211.49:443 binaries.templates.cdn.office.net tcp
GB 173.222.211.49:443 binaries.templates.cdn.office.net tcp
GB 173.222.211.49:443 binaries.templates.cdn.office.net tcp
GB 173.222.211.49:443 binaries.templates.cdn.office.net tcp
GB 173.222.211.49:443 binaries.templates.cdn.office.net tcp
GB 173.222.211.49:443 binaries.templates.cdn.office.net tcp
GB 173.222.211.49:443 binaries.templates.cdn.office.net tcp
GB 173.222.211.49:443 binaries.templates.cdn.office.net tcp
GB 173.222.211.49:443 binaries.templates.cdn.office.net tcp
GB 173.222.211.49:443 binaries.templates.cdn.office.net tcp
US 8.8.8.8:53 138.167.16.2.in-addr.arpa udp
US 8.8.8.8:53 49.211.222.173.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 dailyemploy.com udp
US 3.130.253.23:443 dailyemploy.com tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 10.27.171.150.in-addr.arpa udp
US 8.8.8.8:53 1.173.189.20.in-addr.arpa udp
US 3.130.204.160:443 dailyemploy.com tcp
US 8.8.8.8:53 dailyemploy.com udp
US 3.94.41.167:443 dailyemploy.com tcp

Files

memory/2348-0-0x00007FFA5C710000-0x00007FFA5C720000-memory.dmp

memory/2348-2-0x00007FFA5C710000-0x00007FFA5C720000-memory.dmp

memory/2348-1-0x00007FFA5C710000-0x00007FFA5C720000-memory.dmp

memory/2348-4-0x00007FFA5C710000-0x00007FFA5C720000-memory.dmp

memory/2348-3-0x00007FFA9C72D000-0x00007FFA9C72E000-memory.dmp

memory/2348-5-0x00007FFA5C710000-0x00007FFA5C720000-memory.dmp

memory/2348-8-0x00007FFA9C690000-0x00007FFA9C885000-memory.dmp

memory/2348-10-0x00007FFA9C690000-0x00007FFA9C885000-memory.dmp

memory/2348-9-0x00007FFA9C690000-0x00007FFA9C885000-memory.dmp

memory/2348-7-0x00007FFA9C690000-0x00007FFA9C885000-memory.dmp

memory/2348-11-0x00007FFA5A180000-0x00007FFA5A190000-memory.dmp

memory/2348-14-0x00007FFA9C690000-0x00007FFA9C885000-memory.dmp

memory/2348-13-0x00007FFA9C690000-0x00007FFA9C885000-memory.dmp

memory/2348-15-0x00007FFA9C690000-0x00007FFA9C885000-memory.dmp

memory/2348-12-0x00007FFA9C690000-0x00007FFA9C885000-memory.dmp

memory/2348-18-0x00007FFA9C690000-0x00007FFA9C885000-memory.dmp

memory/2348-19-0x00007FFA9C690000-0x00007FFA9C885000-memory.dmp

memory/2348-17-0x00007FFA5A180000-0x00007FFA5A190000-memory.dmp

memory/2348-16-0x00007FFA9C690000-0x00007FFA9C885000-memory.dmp

memory/2348-6-0x00007FFA9C690000-0x00007FFA9C885000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

MD5 d29962abc88624befc0135579ae485ec
SHA1 e40a6458296ec6a2427bcb280572d023a9862b31
SHA256 a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866
SHA512 4311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

MD5 fde44c593114eb3554d1febb9786bf1b
SHA1 19720d3b01b8a21c9edf2ae899fb5d873f7ebd7b
SHA256 cd45296e88f9d240cdf2da2ed415c6bde2ed994220b8fa8971b74510a6d4973d
SHA512 3514535f0fe798a36e0742f3fda56fa7e2f61ad90d643fe8716e8b0268ddb5cc5070db1c7b5038813e256e0ab5ab1510e13d8a6d57a408ace42e07cb988876c8

C:\Users\Admin\AppData\Local\Temp\TCDD22E.tmp\gb.xsl

MD5 51d32ee5bc7ab811041f799652d26e04
SHA1 412193006aa3ef19e0a57e16acf86b830993024a
SHA256 6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA512 5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

memory/2348-171-0x00007FFA9C690000-0x00007FFA9C885000-memory.dmp

memory/2348-226-0x00007FFA9C690000-0x00007FFA9C885000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\3E43292D-FB42-485A-B314-5F13CD74B24A

MD5 fe726ba45467bcc93587ae83c49765f1
SHA1 0368ff0d2e81c1fea226c2282c9e6f9d83bb52f6
SHA256 aa99c92fc2b93bb711540c592dee80c5aa2a93e7ef07590ac6ee6cde1b69010a
SHA512 3bd1f61060bd587dbf76758a4926165a12fd5bb909e8545bb8a01ce60a84025483446d441e95afff917229dbfad06c9809e05d88e9efff13b6c0df47ccda36d8

C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbres

MD5 39d8818222ae74a4e3d285206c7a2c9d
SHA1 208d67cbac86db6b75ae27117f2fd395abe12a9d
SHA256 01b035e7855cfeb6d3e3f2cf05d054d0259ca4667d94ebada56357e4a28d0a1f
SHA512 1ed6b333475f4b2957beb2c93974e3d72414d79706495a6d2b1f4cf0bebba801fe901c2da3b916fcdd84c2c34f05ea506e27390ed14e3bb84c671066cbffc389

C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres

MD5 19e1e142cbc0497693346de3e2ded932
SHA1 67afa5a8fbfdb08e648bb7d85c20dd5643e4d8c4
SHA256 965a5dfd53a038baa5348448d8b7b28829f487a39d17dbfdca9e6283b6e190a4
SHA512 38735639478099ac12f4fe522bbf4891cc92a5b5552e367bfc7c5c4043eded20947bbba1b37c45655e6be689e4e96ba4565aeea69ff5b31a62837850e8e6f601

memory/2348-729-0x00007FFA9C690000-0x00007FFA9C885000-memory.dmp