Analysis
-
max time kernel
142s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 11:06
Static task
static1
Behavioral task
behavioral1
Sample
a68a7ab925e4b20b7e374eb6409d2623_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a68a7ab925e4b20b7e374eb6409d2623_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a68a7ab925e4b20b7e374eb6409d2623_JaffaCakes118.exe
-
Size
17KB
-
MD5
a68a7ab925e4b20b7e374eb6409d2623
-
SHA1
01fbea1a7c75fad4cb3e247f6f1450ec4cec9d8f
-
SHA256
157d78f7d2f6e6dd034cba7f8c368e90897ec0d7879208f325bf2e3545d47f62
-
SHA512
57a6b851884de9166ea082cd7e650d7c3ee0a0db1ab2f658919c80454f6cd8d64fcb013b9d3aa2a88339b232b06db664bd069ff0fd733198d7c1a5ea2027d904
-
SSDEEP
384:FilFiNQQxuh2oBRhfUDsWgYqjfunkyXDue5VTbi:FilFrIyUgW/qrunnXDT5Vbi
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe rundll32.exe tftp.nfo beforegllav" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe rundll32.exe tftp.nfo beforegllav" a68a7ab925e4b20b7e374eb6409d2623_JaffaCakes118.exe -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE is not expected to spawn this process 2332 2548 svchost.exe 30 -
Deletes itself 1 IoCs
pid Process 2332 svchost.exe -
Loads dropped DLL 3 IoCs
pid Process 2076 a68a7ab925e4b20b7e374eb6409d2623_JaffaCakes118.exe 2548 WINWORD.EXE 2332 svchost.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\tftp.nfo WINWORD.EXE File opened for modification C:\Windows\SysWOW64\tftp.nfo WINWORD.EXE File opened for modification C:\Windows\SysWOW64\tftp.nfo a68a7ab925e4b20b7e374eb6409d2623_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Office loads VBA resources, possible macro or embedded object present
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\idid svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\idid\url0 = 1e9b6dd889e6c45578f5136ca0e0ee16158136cbddbd991873f9596fbcf19a98af1ba19ac55d42e409c0df21274d8109 svchost.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2548 WINWORD.EXE -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2548 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2548 WINWORD.EXE 2548 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2332 2548 WINWORD.EXE 31 PID 2548 wrote to memory of 2332 2548 WINWORD.EXE 31 PID 2548 wrote to memory of 2332 2548 WINWORD.EXE 31 PID 2548 wrote to memory of 2332 2548 WINWORD.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a68a7ab925e4b20b7e374eb6409d2623_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a68a7ab925e4b20b7e374eb6409d2623_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Drops file in System32 directory
PID:2076
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Process spawned unexpected child process
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD596332d4d64d113f05f21cfd4c320fa60
SHA1d879ac5d7824a2c0a583ea2780c481e11b88d9c1
SHA2561265f1fd279cedc272d10c55b98bf21fc83ca0c363bdf913c8861f1029b801f2
SHA51221f0f347c9227d8f5c4ccd9d5aebc0bf952122f6950be7fcc02fdadc82e458dbbb294fe8744d29284728493da9bae6eb310aa7fdd152d8b2cfeaed0433cd5669