Analysis
-
max time kernel
144s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 08:16
Static task
static1
Behavioral task
behavioral1
Sample
b2bbb66f5ebccac3b3ccef14587de959_JaffaCakes118.rtf
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b2bbb66f5ebccac3b3ccef14587de959_JaffaCakes118.rtf
Resource
win10v2004-20240802-en
General
-
Target
b2bbb66f5ebccac3b3ccef14587de959_JaffaCakes118.rtf
-
Size
113KB
-
MD5
b2bbb66f5ebccac3b3ccef14587de959
-
SHA1
e5d57d406a6d8a29b267fbb679dde1e0d544574d
-
SHA256
14b6f5f3a04a8f6ba5dce1a71c48d28d8c5f9ba7e2615ab55e92e85fe9db610e
-
SHA512
5047c331cf406598c2332e34d0e050c976c0e1f1324e268ce2b1bcb91510768221826bc31659ba2c357427a3336d00c42ecda9424d39030ce90024dc95a56183
-
SSDEEP
1536:qsqAf1k5oukgHFPoKb4wblJN0esW297yOlCrf1k5oukgHFPoKb4C:qVAul3lF4CyesW2EOlCrul3lF4C
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2688 WINWORD.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2688 WINWORD.EXE 2688 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2688 WINWORD.EXE 2688 WINWORD.EXE 2548 EXCEL.EXE 2548 EXCEL.EXE 2548 EXCEL.EXE 2688 WINWORD.EXE 2548 EXCEL.EXE 2548 EXCEL.EXE 2548 EXCEL.EXE 2548 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2696 2688 WINWORD.EXE 30 PID 2688 wrote to memory of 2696 2688 WINWORD.EXE 30 PID 2688 wrote to memory of 2696 2688 WINWORD.EXE 30 PID 2688 wrote to memory of 2696 2688 WINWORD.EXE 30
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\b2bbb66f5ebccac3b3ccef14587de959_JaffaCakes118.rtf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
PID:2548