Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2024, 15:01

General

  • Target

    bc3891b9029229e2af500c6600cad6a6_JaffaCakes118.docm

  • Size

    166KB

  • MD5

    bc3891b9029229e2af500c6600cad6a6

  • SHA1

    dd3e26001d98b3bc2faf912c401bc5c5bbac31ba

  • SHA256

    fc5402c5b704b7e3a60a662ac119b3503e1cb185c58da0064dfb9fdc2b097a44

  • SHA512

    237a7bd2b97adcf67f0dce3046bf0a33b798dd9a16e78c5fce840145459df5d59c79b360e321b6d880a387b258e88a98f0c29d746db8329456a86183f4365504

  • SSDEEP

    3072:UyvES1XRJHB2yrlqx1Jxh3Sc7g2QhxmKiIrUl9ugcnSE4BcyYbbSa5haq6Z:UysmXReuGJ3ZsqK5UknSnbghC

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\bc3891b9029229e2af500c6600cad6a6_JaffaCakes118.docm"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3032
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2640

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{8C85893B-0319-422D-959E-BD14AC54FAB9}.FSD

            Filesize

            128KB

            MD5

            f5dfa5724697ddc5602ed2a0f7a79010

            SHA1

            ba96925d1527ec97ef35a6fc4d4f1b3a31e67f61

            SHA256

            ee87a6496e1b9e9fe7567708abc8fcae756552cc648acc5aa702547917587263

            SHA512

            6b5afbdad9e1229da19a6cf0f4c57af14870685288aa85b4599cf292eed11034fae2d84f587de2df85878142c05fe28ee77fa0df6f9b241d9b94236a91c3843c

          • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

            Filesize

            128KB

            MD5

            f133a9e02ef17816f81f53eeb8bde2c1

            SHA1

            b78ee0dcda5d00e61ac6b52c64fb6f0a361ee0db

            SHA256

            665643a38ae6a5c328a4a053b808c01d73a2b0a03b1b61c4e1fbef6229f0afd2

            SHA512

            0c891511f720dc3f55e8eb58e899e0d86d92c9840751ecd92707650674a94cfdf62a260b14ca10fb8465ec0f5f3128f067d7e878b509571aea14dc6623e07ddb

          • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{36AC0B2E-D946-4CB5-97EB-35D677ED52D8}.FSD

            Filesize

            128KB

            MD5

            443b8ee013817bd8074c4a44480f0157

            SHA1

            966417edb127b3f70441f2067b93e9553160cbd5

            SHA256

            02accbea6a699f883fd50000795ab0a749d990a23aa5b6e14493841ecd63d289

            SHA512

            eeb3171ba41b70a2715c5ed0a0e77bf9b3689f444cd632f74beb334e42ad3f0bdac237a12b412a52470d23323f92ec1a3a4f45f575601df29f02bea9e02143f1

          • C:\Users\Admin\AppData\Local\Temp\{DD23176A-5121-4323-89C3-F35BE1F8D892}

            Filesize

            128KB

            MD5

            403a36cc347530249ef9579f6da1b77f

            SHA1

            c340f6150a8db0f29f99b59f2e6b849525febee6

            SHA256

            630db4e4404380e00462b393d55b76052c2b130cd53bdbfcea63f8b31cce36f9

            SHA512

            86d24d596e51208a707bb8abaf5e732602c1624e994131d18016c69d1d8d97d98fd990ebce86afa651e8614b5b04c9bed843d22be4da2b1ffa911b93fb3550c1

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            19KB

            MD5

            8ac0c217e08441956605177395382d57

            SHA1

            4cb0b370fabc47a436ed488174c00274f44ea5c2

            SHA256

            2354090dc71b5c8f829ed48defed7685f9ef9b5ee35464db31fe73b8b4736828

            SHA512

            b73e7f2f5dd33938dc11b9916342ef6591a13fc84619f61dbe2caa3c273bf8a515e157f49d111aca74ae1398eb9f0aa4a42e8a3ea185fa3fd1e3b56ac0fec884

          • memory/3032-0-0x000000002F1B1000-0x000000002F1B2000-memory.dmp

            Filesize

            4KB

          • memory/3032-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/3032-2-0x000000007091D000-0x0000000070928000-memory.dmp

            Filesize

            44KB

          • memory/3032-67-0x000000007091D000-0x0000000070928000-memory.dmp

            Filesize

            44KB

          • memory/3032-90-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/3032-91-0x000000007091D000-0x0000000070928000-memory.dmp

            Filesize

            44KB