Analysis
-
max time kernel
144s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 11:16
Static task
static1
Behavioral task
behavioral1
Sample
73d1b9dd9258688df62e79abdec6ed63_JaffaCakes118.doc
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
73d1b9dd9258688df62e79abdec6ed63_JaffaCakes118.doc
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
decrypted.xlsx
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
decrypted.xlsx
Resource
win10v2004-20240709-en
General
-
Target
73d1b9dd9258688df62e79abdec6ed63_JaffaCakes118.doc
-
Size
2.1MB
-
MD5
73d1b9dd9258688df62e79abdec6ed63
-
SHA1
0a84f7765aa4695b986d666fbedf97db173f334d
-
SHA256
7dbd441f75001644def783b53d2059b9996ffa0b116be9d01ae3001d28f649ed
-
SHA512
8839e42f870276e3fe3571c8dc6648f3350d196ba21d93ffcaa7f7dbbf87ad3477393c4f4d65df1c22c1d85bbb76a7bc26e26ee1039e452d91753c947dc01e07
-
SSDEEP
49152:DP2On2nVWSmgrD7rb6hUgNTSuJJ4afnlKg5l+sg8PX:DbnI6gTrWigBSuJqQlKg5l+sg8PX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1544 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1544 WINWORD.EXE 1544 WINWORD.EXE 1544 WINWORD.EXE 1544 WINWORD.EXE 1544 WINWORD.EXE 1544 WINWORD.EXE
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\73d1b9dd9258688df62e79abdec6ed63_JaffaCakes118.doc"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1544