Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 08:27
Static task
static1
Behavioral task
behavioral1
Sample
de0d8b18c966010991edbdb758bbbdb6_JaffaCakes118.doc
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
de0d8b18c966010991edbdb758bbbdb6_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
de0d8b18c966010991edbdb758bbbdb6_JaffaCakes118.doc
-
Size
151KB
-
MD5
de0d8b18c966010991edbdb758bbbdb6
-
SHA1
c31795d52a9350f9c9189d4cf5c3180b53dd45a7
-
SHA256
7e348cbf0bb85b15e9f742193f2073ad5cd0cda176a4f0da91a947f9bcb54b6b
-
SHA512
09db5b59600f1ee7c09ef784aa69a95d602df2e22ea30a622b41d2328b3c3914cb6a9b846be17e53bec95879a9b10ad770e663d8cda79b6d0a471d8c1c2714e7
-
SSDEEP
1536:8H1DB445TEgrO3jSWAg83tle1ZZ0293QM0eetR2cOupLB5UZ5J+a9DiYFHC3qoXe:O22TWTogk079THcpOu5UZJVdCVtBQoy
Malware Config
Signatures
-
Process spawned suspicious child process 1 IoCs
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 1740 316 DW20.EXE 82 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dwwin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dwwin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dwwin.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dwwin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwwin.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 316 WINWORD.EXE 316 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 316 WINWORD.EXE 316 WINWORD.EXE 316 WINWORD.EXE 316 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 316 WINWORD.EXE 316 WINWORD.EXE 316 WINWORD.EXE 316 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 316 wrote to memory of 1740 316 WINWORD.EXE 88 PID 316 wrote to memory of 1740 316 WINWORD.EXE 88 PID 1740 wrote to memory of 1916 1740 DW20.EXE 89 PID 1740 wrote to memory of 1916 1740 DW20.EXE 89
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\de0d8b18c966010991edbdb758bbbdb6_JaffaCakes118.doc" /o ""1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE" -x -s 46522⤵
- Process spawned suspicious child process
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\system32\dwwin.exeC:\Windows\system32\dwwin.exe -x -s 46523⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:1916
-
-