Analysis
-
max time kernel
145s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 14:04
Static task
static1
Behavioral task
behavioral1
Sample
ab50ae3aaad164d39f6866926004f0c2_JaffaCakes118.doc
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ab50ae3aaad164d39f6866926004f0c2_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
ab50ae3aaad164d39f6866926004f0c2_JaffaCakes118.doc
-
Size
67KB
-
MD5
ab50ae3aaad164d39f6866926004f0c2
-
SHA1
eb6feb7d72bf10a403cdf081ef0fd695b31859bb
-
SHA256
464182144f83c6896fc2f1a801fd32d223f09bee62381944209215e7896d6220
-
SHA512
ad27fed82d70c36026abf5fccaf3474cbf130f77cb02f415f79d0aca1f83c33a838f8c3ed060b1ad4bcbed29371eea70c02408a411ea0ac7ff0446ad11db1b39
-
SSDEEP
1536:1Oc2MVv94q7wX7vIF/HP+9w5t6IT3Kq8EaA19wG5LJ2T:1OlVG5
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4892 WINWORD.EXE 4892 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 4892 WINWORD.EXE 4892 WINWORD.EXE 4892 WINWORD.EXE 4892 WINWORD.EXE 4892 WINWORD.EXE 4892 WINWORD.EXE 4892 WINWORD.EXE 4892 WINWORD.EXE 4892 WINWORD.EXE 4892 WINWORD.EXE 4892 WINWORD.EXE 4892 WINWORD.EXE 4892 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ab50ae3aaad164d39f6866926004f0c2_JaffaCakes118.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d
-
Filesize
29KB
MD5b1e729207a6ce2f5bdc8c0fbf8c3ff52
SHA186fd71d548b7f31d3b441e6633888b7f5a1c570d
SHA256f7252c8f0539ada98b8ed86796375729ffb732fd2f1e1d210b826298545356bd
SHA512fdb62ca174e1de8dcb43ec08103b49a9393ff3083c7aad98d75b07d8d6f599a50fe6acb8e0d70760488e8c3a1368a2dd799aec8138d379307e6bf3d0677e5363
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize1KB
MD520f3970c60009a20dc9e9ba80c503a21
SHA1178cb3bc8a31843c963a269b02b38200e5b08604
SHA256de43ac49f71f9499c6e49d62655121a15e52f2c8f3e4197465922b64fe95a556
SHA512e55f8feb072ea240cd982c2c7df33f051f479c1d146c7955b26a2760eaa89bffd96caac94e9cfcabc23e004332d5a35a0844a88a06e1ba0e519417d906fc92ef