Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 19:08
Static task
static1
Behavioral task
behavioral1
Sample
8b9eaf7a43033ddcada3788878d60665_JaffaCakes118.docm
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8b9eaf7a43033ddcada3788878d60665_JaffaCakes118.docm
Resource
win10v2004-20240802-en
General
-
Target
8b9eaf7a43033ddcada3788878d60665_JaffaCakes118.docm
-
Size
382KB
-
MD5
8b9eaf7a43033ddcada3788878d60665
-
SHA1
29387bd86769349d09e65ab685a17eb8759b1bc2
-
SHA256
dfce1d462c53941da0f1d933698bb705c792f9f878f0a6820397e3f7209ea0b5
-
SHA512
b74351062e01f8f50dc7407797149e8b19a0e8228ce7ea645280461d673b6f98d87cb6ebc24320c481143a36e8dc7789dab165f01735357917784e8d7f35bd97
-
SSDEEP
6144:4/2GQYO2wfyqUBDD5LpUuTSVbkecVQYP3yil1s8HsDsXAYeTkpoCz7Jcp:4+RaqUBDDppUugqiYKaBYs1pok7ip
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\http:\bit.ly\2HloaderqVbva WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2700 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2700 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2700 WINWORD.EXE 2700 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2980 2700 WINWORD.EXE 32 PID 2700 wrote to memory of 2980 2700 WINWORD.EXE 32 PID 2700 wrote to memory of 2980 2700 WINWORD.EXE 32 PID 2700 wrote to memory of 2980 2700 WINWORD.EXE 32
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\8b9eaf7a43033ddcada3788878d60665_JaffaCakes118.docm"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
Filesize128KB
MD5b0ebc58606ea28704c733e22e42d2f9e
SHA1c0e60eb84777064d048562015529238c9f301c5a
SHA256d9c4494f9523c3c154814b56a18298516cfbe78605cbad3944c35ef7ed841237
SHA5128f912ac5d0067f2a8706518a946f3b5df58d26605c10c58a8e5d30ede8a7a553371757cf6a843c0cc568331f2044e8edf02c7754dc9d0e475e8f9ec13f77e978
-
Filesize
39KB
MD5c2485d9ae8e561a192571bc6a1285725
SHA15547d74bc1ef2ddc668398f07ca34d6b6ad2393c
SHA2565c3e2dd465a682f147a42238021c54ca029774971f6738d680443af925381166
SHA512be629b38d008fd7abb6285797dcf6164df09a4f3fd43449f8b49e9bcf9c9270f4795f6fc00b43fe074418099d0a1a7b90d576c9b5d628b8191c8bfcf5cebba2c
-
Filesize
128KB
MD5e20d9c406e037c63d75fc1125fcb0efb
SHA14ff90dd7a3aabb2e66e2f42c2151482a765c2e1d
SHA256bd4a0c7040e4f9137f9009149e735a35ba7cd3a006365936977d99468f916990
SHA5123944791735f0f03cb939c542deb8b3c32abf051e98897c975fa4205801430d5791eac77854126bbdad9e6c7dcab7ee30769af67763799b967f1ba6b08b5e6c81
-
Filesize
19KB
MD52b1f89a42d039bd0a4ef16806c46e36d
SHA1cf0a35ecb912597d150b9509141d72a5c64b84d7
SHA256f27a8a58c52f8e82cba81f0283db5fabbde79df02d06b55c9776fddaf423913c
SHA512143e052f55ae9fcb351422f3a16d63578e2c99463ea5076acafd7bc99ca0125ec914571b3ef73ceaa097c9abcd5e6463074b4bf6f0a99cf7fe00af11fbdaea45