Analysis

  • max time kernel
    144s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    16-08-2024 20:57

General

  • Target

    9fe829d097acca3423fcc6df6666b52d_JaffaCakes118.doc

  • Size

    239KB

  • MD5

    9fe829d097acca3423fcc6df6666b52d

  • SHA1

    2ac7468b30aea7d962e98b466940912577e352c6

  • SHA256

    3cb0b4bb1c14c7a10398abccd291cc5b5dcd86fdd7aeecfcbb86b7f4161bc00d

  • SHA512

    fd4e75fb85548191e4a00e6395aed2af054359a26f66173134b30fc4cc70eb5e4e03cf1e1ddac28743462fac5aa954961ae7d2864184033591b2a1d38fdde2ca

  • SSDEEP

    1536:aterU1wDv/6MaETOgnHJcIKBC5bvzsLHrTPfyOK/dRYipyhv7gz1VYyAOm:a/wDvWETOgnHJcIKBs7qAdSJc5VKOm

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\9fe829d097acca3423fcc6df6666b52d_JaffaCakes118.doc"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2552
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2820
    • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
      1⤵
      • Abuses OpenXML format to download file from external location
      • System Location Discovery: System Language Discovery
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:836
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
      1⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:668
    • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
      1⤵
      • Abuses OpenXML format to download file from external location
      • System Location Discovery: System Language Discovery
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2344
    • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
      1⤵
      • Abuses OpenXML format to download file from external location
      • System Location Discovery: System Language Discovery
      • Enumerates system info in registry
      • Suspicious use of SetWindowsHookEx
      PID:1668

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      ef85cc74f090b6763d33680bd306b69d

      SHA1

      6d00885d591f5b57cb1271d893c80aa2493c7243

      SHA256

      056d9800572cd42d63f36c25d34e686906d10f4f874e75b50678dbb3a36b165f

      SHA512

      e8b46b5a84cc822d76a7e66d2ee947593454dc7b8690518e5200b37fda187612e5fc91fd14d5406c12747c3f3da4f34c8239ab391ec1b2b015ac553eda196128

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{7CE7BEF8-6CDD-4AE1-A83A-C66C4452DEF0}.FSD

      Filesize

      128KB

      MD5

      c83383fe1af5ea6c87a064a96cf30e1b

      SHA1

      db98601ae4274f8720cb7043c401b7cfad9f997a

      SHA256

      4922c256a749bf6765a8ed2959bfe832c5531a62a9b939636123235d3d697681

      SHA512

      bc8c107515d89558305951d19abd356ad9f2b0898b216624ae75daab9cf9c10f826f5612020a37a712672dcac1dae5c034886ec469e807ccadc3bdbedfaf1b58

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSF-CTBL.FSF

      Filesize

      114B

      MD5

      5d84ee63ddc28ecc2dd46e14613f052b

      SHA1

      e09e05f47858ccbe786b9b26819173926c0d397f

      SHA256

      36cb669d4b24d70b107235833a5065ee5faaefdc51b6a67b77e2f85aeed009fc

      SHA512

      0e7f719c4cb2651495bf2044284a404cc7da0bd91eb7674f0ad2013cb5b4e138ba4ef11d6d32f5f1cfeeadeaefb5d5ff246b5e3e232e3203fc9bf8f0152271ba

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      0b8c6510cd27cd84beff330894c07281

      SHA1

      9cd4c4d5899cf4354a2e40dea4805c00c3e5e809

      SHA256

      090849654276bf02986890c3dc73f9e183879e73b440095e92f414f79dd22039

      SHA512

      57affffcc448cb06a0d3e9a1be40b0da1729e91e09817888aadec229707a1cf496781f304562353b58ca2b128dc43249593c5160c830a3f0a65aea7753b83dca

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      11a119cc3b3cb5b6637743419f1e6033

      SHA1

      1d6d80edea5220e099b009727e71d86b2da8a5b3

      SHA256

      17233ea266cd419e47935e012d36b879a907192c99e45382e53da842d61f4bec

      SHA512

      c62314d225a1efb3c0f0e7607d6a048e10e5296fbe2dd269a22bf070636d18ab5d32a0fef50812457b6d266acb01c604e92470ed287aad31d786a55cff63e8d8

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{DA72AC13-72E3-4639-BB62-0D7F32F19F3B}.FSD

      Filesize

      128KB

      MD5

      25bde0b5777d1bfeec10db2931c7c012

      SHA1

      94569621d2957991f0c49ce14b4d561e6dda9411

      SHA256

      1fe9ecca8c924e7ce476f6b4791a47ee3b1b0d3ede3c37a64f9b42ec8fe8bc0b

      SHA512

      579b5171f192b252467b4c6fb09d5d0aae0fd63a96eaf511e8b3ad0bb0afa5b0d9f1cab153831d4ecb75fa0d4e997a729583ce9cec2fd46d35019251178db272

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSF-{0E1EEE64-E8C6-4E2A-9759-63CF07FD8988}.FSF

      Filesize

      114B

      MD5

      d56b8540fd6b28e6a9882680e19a70b9

      SHA1

      9e3de72823af1e78be8b7dea9b71aa6745b74b85

      SHA256

      565276afd2a08deb20c91e89ed5d25b91ffe33360025c0463f8ca54768ef00f0

      SHA512

      08be92d12e16aa2c000fddf60f36c9d204ad27dc0a651831567bc680118b5b8efdd6180c98c165c46cb3545ad3d062d14d1e7928c7f9e2fa2679cc705349842e

    • C:\Users\Admin\AppData\Local\Temp\VBE\MSForms.exd

      Filesize

      143KB

      MD5

      96c29bc74322d4bad02e75962b202b65

      SHA1

      5abdf6ee4e3b564f5c7811d02552e76bd668e408

      SHA256

      261c40acf922771b9f38ab915e3c10b170e7b788398e37966a2254e099456114

      SHA512

      171b2630a5e9e2d705ddabf9222c3865fe533272a7d92185d0e548d9c906b1f84a5c80e06d1dad85381642cf88442a34014349c77c87b004ab4be9f043c22965

    • C:\Users\Admin\AppData\Local\Temp\{9C673F85-C9A9-4FBE-9814-ADE3BE19E9C5}

      Filesize

      128KB

      MD5

      e8d391fc4e1c30885e0e85be7072a8fa

      SHA1

      3710758ab73ca7ebb6ee5461d3ce23296cfb7d06

      SHA256

      f2bb6391cc5071e75e3317ed3770f0fe26c6de871931d4e922d2f65e118f3c47

      SHA512

      8063a46a98a4171ea396935d81ac8fe1dbefc569cce16e9076670aac5981625654aed76ca5f05521f6a6798c786edf6de4b0be416ce25ac178565e9dd9348335

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      c4d11f0bf0cf780386dbc5f43e64f049

      SHA1

      550412718a7ff892cea80a8c31a9829c8a406ae6

      SHA256

      ff1199924cbfae8595fc0147df1976c6c65b8e92ac707194caccd6b11e7da059

      SHA512

      715441fd0e97244e1b998135889b82a292e0f4f9ce5b2d454ad6b3cdc1fc0dddd94f3e41fd690c3bbd5a2527cbf7e9ea7e76565659660f46ea6d32ccde2aa6c0

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • memory/836-1027-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2552-68-0x000000000E8E0000-0x000000000E9E0000-memory.dmp

      Filesize

      1024KB

    • memory/2552-0-0x000000002F051000-0x000000002F052000-memory.dmp

      Filesize

      4KB

    • memory/2552-18-0x00000000714BD000-0x00000000714C8000-memory.dmp

      Filesize

      44KB

    • memory/2552-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2552-2-0x00000000714BD000-0x00000000714C8000-memory.dmp

      Filesize

      44KB