Analysis

  • max time kernel
    101s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/09/2024, 16:11

General

  • Target

    de79bfb0b9bbe64d864c718e5f80a320_JaffaCakes118.doc

  • Size

    42KB

  • MD5

    de79bfb0b9bbe64d864c718e5f80a320

  • SHA1

    e66fd6623341ea1394e589cff6f99e3e9ddfb0c1

  • SHA256

    1324773cd91382198c36bc0c545bca3a905e8303989b412e49c7dfa075d4d911

  • SHA512

    26e96cd8bcb38c6a62611a350c44f70801aaca28e36e65d5037459900a9a2c551403630b2dc0dbddf82fafd005f595cd7586af573126356a952023a59bd7fc61

  • SSDEEP

    384:VytUOmerkSYQRTRkM8FQPDMi0Bsoi/bNyXZe5hQGoP:NOmgkSY0DMjni/bcJe5hQGu

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\de79bfb0b9bbe64d864c718e5f80a320_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:5108

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\TCDD70D.tmp\iso690.xsl

          Filesize

          263KB

          MD5

          ff0e07eff1333cdf9fc2523d323dd654

          SHA1

          77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

          SHA256

          3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

          SHA512

          b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

        • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

          Filesize

          23KB

          MD5

          d6b154415835e385dbf7812c1f0df664

          SHA1

          4b62a84aead67328dbd23abe2a0cc1a1dc4d549b

          SHA256

          194d07f341cc0b19b1d64ac4a8cb039f383d41b2f2c762d6a033e269fff8cdf7

          SHA512

          c2ac31b0b3c8bd6b779059801ff725d0d37032914dd6f05ec41ebad8aa610948c1520e7833c97274483d5e43b72ba8cbf7fc5a9c919761f693e477399a0a4324

        • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

          Filesize

          16B

          MD5

          d29962abc88624befc0135579ae485ec

          SHA1

          e40a6458296ec6a2427bcb280572d023a9862b31

          SHA256

          a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866

          SHA512

          4311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          677B

          MD5

          66c88cd165cf41d17def222c915ffafa

          SHA1

          7c3b102952e6572d37c37325bbed72226973cd71

          SHA256

          43caa612d9ebee781bde973d1b347bc44579a6b4c0c8ceb08f0c340bdcaadb01

          SHA512

          c8b4e5ac6ddb675eb2c53effdfeac987adcb85794eb7ec2ac4811f76147be23a3e73d332ac446e606e9e280f1d8c6a904d23847971eed781bf01a81de323c6b8

        • C:\demon

          Filesize

          658B

          MD5

          d819ba7f9dce1decc324a466686c2742

          SHA1

          16f7245f1914e34b810bb8c3341191aa2628655f

          SHA256

          35bc5cef9e354eee864e749547cdc2ac0bce0594bdb5666457fad682d6491e00

          SHA512

          e6fe6042e53a3e071c286a29a1791374e447f45230abe234af75407b80b8efe9b5d6fd1e31638bc18080a8a6bd047ea435a7553161ecf4fdd83df651c787bb9a

        • memory/5108-9-0x00007FFEFAED0000-0x00007FFEFB0C5000-memory.dmp

          Filesize

          2.0MB

        • memory/5108-57-0x00007FFEFAED0000-0x00007FFEFB0C5000-memory.dmp

          Filesize

          2.0MB

        • memory/5108-7-0x00007FFEBAF50000-0x00007FFEBAF60000-memory.dmp

          Filesize

          64KB

        • memory/5108-10-0x00007FFEFAED0000-0x00007FFEFB0C5000-memory.dmp

          Filesize

          2.0MB

        • memory/5108-0-0x00007FFEFAF6D000-0x00007FFEFAF6E000-memory.dmp

          Filesize

          4KB

        • memory/5108-8-0x00007FFEFAED0000-0x00007FFEFB0C5000-memory.dmp

          Filesize

          2.0MB

        • memory/5108-11-0x00007FFEFAED0000-0x00007FFEFB0C5000-memory.dmp

          Filesize

          2.0MB

        • memory/5108-12-0x00007FFEB8C20000-0x00007FFEB8C30000-memory.dmp

          Filesize

          64KB

        • memory/5108-14-0x00007FFEFAED0000-0x00007FFEFB0C5000-memory.dmp

          Filesize

          2.0MB

        • memory/5108-13-0x00007FFEFAED0000-0x00007FFEFB0C5000-memory.dmp

          Filesize

          2.0MB

        • memory/5108-15-0x00007FFEB8C20000-0x00007FFEB8C30000-memory.dmp

          Filesize

          64KB

        • memory/5108-35-0x00007FFEFAED0000-0x00007FFEFB0C5000-memory.dmp

          Filesize

          2.0MB

        • memory/5108-37-0x00007FFEFAED0000-0x00007FFEFB0C5000-memory.dmp

          Filesize

          2.0MB

        • memory/5108-5-0x00007FFEFAED0000-0x00007FFEFB0C5000-memory.dmp

          Filesize

          2.0MB

        • memory/5108-45-0x00007FFEFAED0000-0x00007FFEFB0C5000-memory.dmp

          Filesize

          2.0MB

        • memory/5108-46-0x00007FFEFAED0000-0x00007FFEFB0C5000-memory.dmp

          Filesize

          2.0MB

        • memory/5108-6-0x00007FFEFAED0000-0x00007FFEFB0C5000-memory.dmp

          Filesize

          2.0MB

        • memory/5108-4-0x00007FFEBAF50000-0x00007FFEBAF60000-memory.dmp

          Filesize

          64KB

        • memory/5108-56-0x00007FFEFAF6D000-0x00007FFEFAF6E000-memory.dmp

          Filesize

          4KB

        • memory/5108-58-0x00007FFEFAED0000-0x00007FFEFB0C5000-memory.dmp

          Filesize

          2.0MB

        • memory/5108-59-0x00007FFEFAED0000-0x00007FFEFB0C5000-memory.dmp

          Filesize

          2.0MB

        • memory/5108-60-0x00007FFEFAED0000-0x00007FFEFB0C5000-memory.dmp

          Filesize

          2.0MB

        • memory/5108-61-0x00007FFEFAED0000-0x00007FFEFB0C5000-memory.dmp

          Filesize

          2.0MB

        • memory/5108-2-0x00007FFEBAF50000-0x00007FFEBAF60000-memory.dmp

          Filesize

          64KB

        • memory/5108-70-0x00007FFEFAED0000-0x00007FFEFB0C5000-memory.dmp

          Filesize

          2.0MB

        • memory/5108-71-0x00007FFEFAED0000-0x00007FFEFB0C5000-memory.dmp

          Filesize

          2.0MB

        • memory/5108-3-0x00007FFEBAF50000-0x00007FFEBAF60000-memory.dmp

          Filesize

          64KB

        • memory/5108-1-0x00007FFEBAF50000-0x00007FFEBAF60000-memory.dmp

          Filesize

          64KB

        • memory/5108-310-0x00007FFEBAF50000-0x00007FFEBAF60000-memory.dmp

          Filesize

          64KB

        • memory/5108-313-0x00007FFEBAF50000-0x00007FFEBAF60000-memory.dmp

          Filesize

          64KB

        • memory/5108-311-0x00007FFEBAF50000-0x00007FFEBAF60000-memory.dmp

          Filesize

          64KB

        • memory/5108-312-0x00007FFEBAF50000-0x00007FFEBAF60000-memory.dmp

          Filesize

          64KB

        • memory/5108-314-0x00007FFEFAED0000-0x00007FFEFB0C5000-memory.dmp

          Filesize

          2.0MB