Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 16:11
Static task
static1
Behavioral task
behavioral1
Sample
c92964c4744c19401a997a0a2f445240_JaffaCakes118.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c92964c4744c19401a997a0a2f445240_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
c92964c4744c19401a997a0a2f445240_JaffaCakes118.doc
-
Size
59KB
-
MD5
c92964c4744c19401a997a0a2f445240
-
SHA1
e7a84d4f344eb1afbc1d650a2e266dcf4eade141
-
SHA256
1d70de5b4c32c00a453a31a72470ba60fe307eb0eea2ebbbb7a9b1533cfd63d8
-
SHA512
01b48b0a8daac87eb067f26d593775e2dea9fbe5a04576eced0f70a54e6d401a9c7a0e4bade9489f82b1f0c11f14bd31166c34ceb9ca5f33e5ec752f7d0e5d41
-
SSDEEP
768:ykAq3tnhakYLTSqoEfr1vkAEKtGEI2uqv05APgfF/2h:we3akYLTSqoED3AED7cvfG
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2344 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2344 WINWORD.EXE 2344 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2760 2344 WINWORD.EXE 32 PID 2344 wrote to memory of 2760 2344 WINWORD.EXE 32 PID 2344 wrote to memory of 2760 2344 WINWORD.EXE 32 PID 2344 wrote to memory of 2760 2344 WINWORD.EXE 32
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\c92964c4744c19401a997a0a2f445240_JaffaCakes118.doc"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD58ef2c89759944652895edf628744a937
SHA171eb0fcddee81d3bc874f9349dfb8ef3bd60bb7f
SHA256b67538b2c716e4f4fe6315a275e5ef62a1c1567049a57c5334d3676f93f4d824
SHA51236d24b0643f1b3ca577b638a5256ae3799fcd7b2e06eaba6d6f9c285b488e2523b0946379b3a94eca7f8dec3aee5387c56e3e4dd5a1c76139a9b7ff1a31f9777