Analysis

  • max time kernel
    126s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/09/2024, 03:50

General

  • Target

    ef03d6c77f9299473e82c6cccfefb0c3_JaffaCakes118.rtf

  • Size

    506KB

  • MD5

    ef03d6c77f9299473e82c6cccfefb0c3

  • SHA1

    1038ba22fead7e33c82cc159feb340692a975096

  • SHA256

    325a2e914289e94063ddb91a2cd54320c185917e8e78f760aaf54ad66d2f6523

  • SHA512

    312785af42f51daaf3127dab36be0b3a4bbb1f1e4d136785fce39d8a01db7f606abd3e3933df234c28dabf4d215649eacc68355b0383853fde503bac461453cf

  • SSDEEP

    12288:g+WhWEyIu3ErzRYi/ZxtbS3IWWq6Pk3HnnYhPsvKYRtUMe:gIRI3rzRv/JbS7Wq6WYAXRtUz

Score
4/10

Malware Config

Signatures

  • Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs

    When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 5 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ef03d6c77f9299473e82c6cccfefb0c3_JaffaCakes118.rtf" /o ""
    1⤵
    • Subvert Trust Controls: Mark-of-the-Web Bypass
    • Checks processor information in registry
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4912
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4436,i,11251706013556949551,5157034131170452377,262144 --variations-seed-version --mojo-platform-channel-handle=4252 /prefetch:8
    1⤵
      PID:5104

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\{AF1D0271-1612-4192-967C-F2D9DA3253FB}\inteldriverupd1.sct:Zone.Identifier

            Filesize

            26B

            MD5

            fbccf14d504b7b2dbcb5a5bda75bd93b

            SHA1

            d59fc84cdd5217c6cf74785703655f78da6b582b

            SHA256

            eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

            SHA512

            aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

          • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

            Filesize

            2B

            MD5

            f3b25701fe362ec84616a93a45ce9998

            SHA1

            d62636d8caec13f04e28442a0a6fa1afeb024bbb

            SHA256

            b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

            SHA512

            98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

            Filesize

            3KB

            MD5

            b5323aa9061be4e7a9cc51fca6caa1f1

            SHA1

            f467bb7c17be76b41e12cb08d88140de350ea98b

            SHA256

            16813d89a60f18053b96f463edea17280d8edd8dd4da9d74ec9b6e683ffca9fc

            SHA512

            b70001fc92e02ea23aee1537a17033751871da64459088996d153e20531e6906bc75a98a060c2737b08cd60101e08f433bfbda4626f6ae0a43ab5712f2e6a8d0

          • memory/4912-20-0x00007FFD5AC10000-0x00007FFD5AE05000-memory.dmp

            Filesize

            2.0MB

          • memory/4912-43-0x00007FFD5AC10000-0x00007FFD5AE05000-memory.dmp

            Filesize

            2.0MB

          • memory/4912-10-0x00007FFD5AC10000-0x00007FFD5AE05000-memory.dmp

            Filesize

            2.0MB

          • memory/4912-9-0x00007FFD5AC10000-0x00007FFD5AE05000-memory.dmp

            Filesize

            2.0MB

          • memory/4912-8-0x00007FFD5AC10000-0x00007FFD5AE05000-memory.dmp

            Filesize

            2.0MB

          • memory/4912-7-0x00007FFD5AC10000-0x00007FFD5AE05000-memory.dmp

            Filesize

            2.0MB

          • memory/4912-6-0x00007FFD5AC10000-0x00007FFD5AE05000-memory.dmp

            Filesize

            2.0MB

          • memory/4912-0-0x00007FFD1AC90000-0x00007FFD1ACA0000-memory.dmp

            Filesize

            64KB

          • memory/4912-11-0x00007FFD18C30000-0x00007FFD18C40000-memory.dmp

            Filesize

            64KB

          • memory/4912-13-0x00007FFD5AC10000-0x00007FFD5AE05000-memory.dmp

            Filesize

            2.0MB

          • memory/4912-15-0x00007FFD5AC10000-0x00007FFD5AE05000-memory.dmp

            Filesize

            2.0MB

          • memory/4912-16-0x00007FFD18C30000-0x00007FFD18C40000-memory.dmp

            Filesize

            64KB

          • memory/4912-18-0x00007FFD5AC10000-0x00007FFD5AE05000-memory.dmp

            Filesize

            2.0MB

          • memory/4912-3-0x00007FFD1AC90000-0x00007FFD1ACA0000-memory.dmp

            Filesize

            64KB

          • memory/4912-5-0x00007FFD1AC90000-0x00007FFD1ACA0000-memory.dmp

            Filesize

            64KB

          • memory/4912-19-0x00007FFD5AC10000-0x00007FFD5AE05000-memory.dmp

            Filesize

            2.0MB

          • memory/4912-45-0x00007FFD5AC10000-0x00007FFD5AE05000-memory.dmp

            Filesize

            2.0MB

          • memory/4912-12-0x00007FFD5AC10000-0x00007FFD5AE05000-memory.dmp

            Filesize

            2.0MB

          • memory/4912-2-0x00007FFD1AC90000-0x00007FFD1ACA0000-memory.dmp

            Filesize

            64KB

          • memory/4912-42-0x00007FFD5ACAD000-0x00007FFD5ACAE000-memory.dmp

            Filesize

            4KB

          • memory/4912-17-0x00007FFD5AC10000-0x00007FFD5AE05000-memory.dmp

            Filesize

            2.0MB

          • memory/4912-44-0x00007FFD5AC10000-0x00007FFD5AE05000-memory.dmp

            Filesize

            2.0MB

          • memory/4912-14-0x00007FFD5AC10000-0x00007FFD5AE05000-memory.dmp

            Filesize

            2.0MB

          • memory/4912-1-0x00007FFD5ACAD000-0x00007FFD5ACAE000-memory.dmp

            Filesize

            4KB

          • memory/4912-4-0x00007FFD1AC90000-0x00007FFD1ACA0000-memory.dmp

            Filesize

            64KB

          • memory/4912-88-0x00007FFD1AC90000-0x00007FFD1ACA0000-memory.dmp

            Filesize

            64KB

          • memory/4912-90-0x00007FFD1AC90000-0x00007FFD1ACA0000-memory.dmp

            Filesize

            64KB

          • memory/4912-91-0x00007FFD1AC90000-0x00007FFD1ACA0000-memory.dmp

            Filesize

            64KB

          • memory/4912-89-0x00007FFD1AC90000-0x00007FFD1ACA0000-memory.dmp

            Filesize

            64KB

          • memory/4912-92-0x00007FFD5AC10000-0x00007FFD5AE05000-memory.dmp

            Filesize

            2.0MB