Analysis

  • max time kernel
    139s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/08/2024, 15:01

General

  • Target

    bc3891b9029229e2af500c6600cad6a6_JaffaCakes118.docm

  • Size

    166KB

  • MD5

    bc3891b9029229e2af500c6600cad6a6

  • SHA1

    dd3e26001d98b3bc2faf912c401bc5c5bbac31ba

  • SHA256

    fc5402c5b704b7e3a60a662ac119b3503e1cb185c58da0064dfb9fdc2b097a44

  • SHA512

    237a7bd2b97adcf67f0dce3046bf0a33b798dd9a16e78c5fce840145459df5d59c79b360e321b6d880a387b258e88a98f0c29d746db8329456a86183f4365504

  • SSDEEP

    3072:UyvES1XRJHB2yrlqx1Jxh3Sc7g2QhxmKiIrUl9ugcnSE4BcyYbbSa5haq6Z:UysmXReuGJ3ZsqK5UknSnbghC

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\bc3891b9029229e2af500c6600cad6a6_JaffaCakes118.docm" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Program Files\Microsoft Office\Root\Office16\MsoSync.exe
      "C:\Program Files\Microsoft Office\Root\Office16\MsoSync.exe"
      2⤵
      • Process spawned unexpected child process
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2228

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.accdb

          Filesize

          512KB

          MD5

          3b762f3bb4f10e6f9f7e34863b295737

          SHA1

          26bf841ef2bc620c99f6e8f3e69e263d20f1d690

          SHA256

          c79cf9b85bd0ed50284a83da326a82cd2814010ae6092a234bffc88e0b153b8b

          SHA512

          8227906389753f43c4109a059bdeae72265a1a82a3c528f307a3b68515472910c08becb439b609a9fa9ee09de47bf1ae7c24d16a3afeac55302b5054864b3515

        • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.laccdb

          Filesize

          128B

          MD5

          4c94343b31f8bd8ace8639566eb585c9

          SHA1

          be4348e9879195b312d776ffe42c0b5c414c687a

          SHA256

          b6176aef4babb6960c7d4aa692b506e8f46a5abb2b109c826ba6e75564070242

          SHA512

          a664f9ec417b97ccfcbc19142a046f1ea16935f446d32e5f0a56c316a49625e02551947e2a0328dcd598a0e57eb8ab7c51e37dbf59a8ae55c0a38f2987a917d5

        • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\9D62C040-73C6-4618-9092-2639B2796949

          Filesize

          170KB

          MD5

          398758eb4e1130b623d83efe87de72a5

          SHA1

          39fe87ad27be2d9867393f384b6b11e77c9846d4

          SHA256

          c955b3fb92fa983ed32d32a4cf9b9b272cef7396391a834871d236d65dc8aa97

          SHA512

          389f5f27a5f783569e2a54613c32202106d65a39901a27c31311c60b4d90bbe019962aa8098b20d47aa068e403aa265f41a086e12b53a7f84a3c3d66cae6c869

        • C:\Users\Admin\AppData\Local\Temp\TCDF9DF.tmp\iso690.xsl

          Filesize

          263KB

          MD5

          ff0e07eff1333cdf9fc2523d323dd654

          SHA1

          77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

          SHA256

          3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

          SHA512

          b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

        • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

          Filesize

          2B

          MD5

          f3b25701fe362ec84616a93a45ce9998

          SHA1

          d62636d8caec13f04e28442a0a6fa1afeb024bbb

          SHA256

          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

          SHA512

          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

        • memory/2156-11-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

          Filesize

          2.0MB

        • memory/2156-57-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

          Filesize

          2.0MB

        • memory/2156-9-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

          Filesize

          2.0MB

        • memory/2156-10-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

          Filesize

          2.0MB

        • memory/2156-12-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

          Filesize

          2.0MB

        • memory/2156-13-0x00007FFF43C30000-0x00007FFF43C40000-memory.dmp

          Filesize

          64KB

        • memory/2156-1-0x00007FFF862ED000-0x00007FFF862EE000-memory.dmp

          Filesize

          4KB

        • memory/2156-15-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

          Filesize

          2.0MB

        • memory/2156-18-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

          Filesize

          2.0MB

        • memory/2156-19-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

          Filesize

          2.0MB

        • memory/2156-20-0x00007FFF43C30000-0x00007FFF43C40000-memory.dmp

          Filesize

          64KB

        • memory/2156-17-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

          Filesize

          2.0MB

        • memory/2156-16-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

          Filesize

          2.0MB

        • memory/2156-14-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

          Filesize

          2.0MB

        • memory/2156-7-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

          Filesize

          2.0MB

        • memory/2156-6-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

          Filesize

          2.0MB

        • memory/2156-2-0x00007FFF462D0000-0x00007FFF462E0000-memory.dmp

          Filesize

          64KB

        • memory/2156-577-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

          Filesize

          2.0MB

        • memory/2156-574-0x00007FFF462D0000-0x00007FFF462E0000-memory.dmp

          Filesize

          64KB

        • memory/2156-573-0x00007FFF462D0000-0x00007FFF462E0000-memory.dmp

          Filesize

          64KB

        • memory/2156-0-0x00007FFF462D0000-0x00007FFF462E0000-memory.dmp

          Filesize

          64KB

        • memory/2156-8-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

          Filesize

          2.0MB

        • memory/2156-55-0x00007FFF862ED000-0x00007FFF862EE000-memory.dmp

          Filesize

          4KB

        • memory/2156-56-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

          Filesize

          2.0MB

        • memory/2156-3-0x00007FFF462D0000-0x00007FFF462E0000-memory.dmp

          Filesize

          64KB

        • memory/2156-46-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

          Filesize

          2.0MB

        • memory/2156-5-0x00007FFF462D0000-0x00007FFF462E0000-memory.dmp

          Filesize

          64KB

        • memory/2156-4-0x00007FFF462D0000-0x00007FFF462E0000-memory.dmp

          Filesize

          64KB

        • memory/2228-548-0x00007FFF462D0000-0x00007FFF462E0000-memory.dmp

          Filesize

          64KB

        • memory/2228-40-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

          Filesize

          2.0MB

        • memory/2228-44-0x00007FFF462D0000-0x00007FFF462E0000-memory.dmp

          Filesize

          64KB

        • memory/2228-43-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

          Filesize

          2.0MB

        • memory/2228-270-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

          Filesize

          2.0MB

        • memory/2228-38-0x00007FFF462D0000-0x00007FFF462E0000-memory.dmp

          Filesize

          64KB

        • memory/2228-551-0x00007FFF462D0000-0x00007FFF462E0000-memory.dmp

          Filesize

          64KB

        • memory/2228-45-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

          Filesize

          2.0MB

        • memory/2228-42-0x00007FFF462D0000-0x00007FFF462E0000-memory.dmp

          Filesize

          64KB

        • memory/2228-550-0x00007FFF462D0000-0x00007FFF462E0000-memory.dmp

          Filesize

          64KB

        • memory/2228-552-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

          Filesize

          2.0MB

        • memory/2228-41-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

          Filesize

          2.0MB

        • memory/2228-549-0x00007FFF462D0000-0x00007FFF462E0000-memory.dmp

          Filesize

          64KB

        • memory/2228-39-0x00007FFF462D0000-0x00007FFF462E0000-memory.dmp

          Filesize

          64KB