Analysis
-
max time kernel
144s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 15:54
Static task
static1
Behavioral task
behavioral1
Sample
afdabb0054f015084c55a446118e3473_JaffaCakes118.docm
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
afdabb0054f015084c55a446118e3473_JaffaCakes118.docm
Resource
win10v2004-20240802-en
General
-
Target
afdabb0054f015084c55a446118e3473_JaffaCakes118.docm
-
Size
365KB
-
MD5
afdabb0054f015084c55a446118e3473
-
SHA1
990487f1398d3fe950e38d20ca3f5d271ac7abf9
-
SHA256
7cf248bdae62a6ff5bbc41566eba5c85b3eaf6f5b22cdf46e56d2cb63a69ccba
-
SHA512
017d5efb60342835c17b563a8499b13f5f4eb1232db33acd31caa076e31f62539867765891ccd88503a1bc2727c36b4a5fcf7d33242096b656182878982b097e
-
SSDEEP
6144:sicARoup4jV7w0ba0lIvaRNlVA9I0R/kSp42WCzTf2kCUyBdLNgKsDesUBaKsYQc:0A2up4jV7Za0qvaRnKvxP4hiTf2k2b3J
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE is not expected to spawn this process 2656 2544 rundll32.exe 29 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2544 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2544 WINWORD.EXE 2544 WINWORD.EXE 2544 WINWORD.EXE 2544 WINWORD.EXE 2544 WINWORD.EXE 2544 WINWORD.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2720 2544 WINWORD.EXE 30 PID 2544 wrote to memory of 2720 2544 WINWORD.EXE 30 PID 2544 wrote to memory of 2720 2544 WINWORD.EXE 30 PID 2544 wrote to memory of 2720 2544 WINWORD.EXE 30 PID 2544 wrote to memory of 2656 2544 WINWORD.EXE 31 PID 2544 wrote to memory of 2656 2544 WINWORD.EXE 31 PID 2544 wrote to memory of 2656 2544 WINWORD.EXE 31 PID 2544 wrote to memory of 2656 2544 WINWORD.EXE 31 PID 2544 wrote to memory of 2656 2544 WINWORD.EXE 31 PID 2544 wrote to memory of 2656 2544 WINWORD.EXE 31 PID 2544 wrote to memory of 2656 2544 WINWORD.EXE 31
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\afdabb0054f015084c55a446118e3473_JaffaCakes118.docm"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2720
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" c:\users\admin\appdata\roaming\microsoft\word\startup\W0rd.dll,UninstallFont2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:2656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5e9ab70d6b2d4cb3d5a03564143d5a735
SHA10d6ca0882fb716c648e922b76913700017f175aa
SHA2560e9a8f51c8e4467cce5f82992e2f3d931d26f14a5cbecf51ff8d524b52576ecd
SHA512dec50f0d971eff10661101c873b5c223bd4b2c774d91714a4549f397b995a5aeb5e0b04e75f2394cf2b2cb056ee75c535aee535782eff3819696a7167d6f270d