Analysis
-
max time kernel
101s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 16:11
Behavioral task
behavioral1
Sample
de79bfb0b9bbe64d864c718e5f80a320_JaffaCakes118.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
de79bfb0b9bbe64d864c718e5f80a320_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
de79bfb0b9bbe64d864c718e5f80a320_JaffaCakes118.doc
-
Size
42KB
-
MD5
de79bfb0b9bbe64d864c718e5f80a320
-
SHA1
e66fd6623341ea1394e589cff6f99e3e9ddfb0c1
-
SHA256
1324773cd91382198c36bc0c545bca3a905e8303989b412e49c7dfa075d4d911
-
SHA512
26e96cd8bcb38c6a62611a350c44f70801aaca28e36e65d5037459900a9a2c551403630b2dc0dbddf82fafd005f595cd7586af573126356a952023a59bd7fc61
-
SSDEEP
384:VytUOmerkSYQRTRkM8FQPDMi0Bsoi/bNyXZe5hQGoP:NOmgkSY0DMjni/bcJe5hQGu
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 5108 WINWORD.EXE 5108 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 5108 WINWORD.EXE 5108 WINWORD.EXE 5108 WINWORD.EXE 5108 WINWORD.EXE 5108 WINWORD.EXE 5108 WINWORD.EXE 5108 WINWORD.EXE 5108 WINWORD.EXE 5108 WINWORD.EXE 5108 WINWORD.EXE 5108 WINWORD.EXE 5108 WINWORD.EXE 5108 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\de79bfb0b9bbe64d864c718e5f80a320_JaffaCakes118.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:5108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d
-
Filesize
23KB
MD5d6b154415835e385dbf7812c1f0df664
SHA14b62a84aead67328dbd23abe2a0cc1a1dc4d549b
SHA256194d07f341cc0b19b1d64ac4a8cb039f383d41b2f2c762d6a033e269fff8cdf7
SHA512c2ac31b0b3c8bd6b779059801ff725d0d37032914dd6f05ec41ebad8aa610948c1520e7833c97274483d5e43b72ba8cbf7fc5a9c919761f693e477399a0a4324
-
Filesize
16B
MD5d29962abc88624befc0135579ae485ec
SHA1e40a6458296ec6a2427bcb280572d023a9862b31
SHA256a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866
SHA5124311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize677B
MD566c88cd165cf41d17def222c915ffafa
SHA17c3b102952e6572d37c37325bbed72226973cd71
SHA25643caa612d9ebee781bde973d1b347bc44579a6b4c0c8ceb08f0c340bdcaadb01
SHA512c8b4e5ac6ddb675eb2c53effdfeac987adcb85794eb7ec2ac4811f76147be23a3e73d332ac446e606e9e280f1d8c6a904d23847971eed781bf01a81de323c6b8
-
Filesize
658B
MD5d819ba7f9dce1decc324a466686c2742
SHA116f7245f1914e34b810bb8c3341191aa2628655f
SHA25635bc5cef9e354eee864e749547cdc2ac0bce0594bdb5666457fad682d6491e00
SHA512e6fe6042e53a3e071c286a29a1791374e447f45230abe234af75407b80b8efe9b5d6fd1e31638bc18080a8a6bd047ea435a7553161ecf4fdd83df651c787bb9a