Overview
overview
7Static
static
3f9daf9075d...18.exe
windows7-x64
7f9daf9075d...18.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3License.rtf
windows7-x64
4License.rtf
windows10-2004-x64
1Plugins/Hi...Csv.js
windows7-x64
3Plugins/Hi...Csv.js
windows10-2004-x64
3Plugins/Hi...tml.js
windows7-x64
3Plugins/Hi...tml.js
windows10-2004-x64
3Plugins/Hi...son.js
windows7-x64
3Plugins/Hi...son.js
windows10-2004-x64
3Plugins/Hi...Txt.js
windows7-x64
3Plugins/Hi...Txt.js
windows10-2004-x64
3QTranslate.exe
windows7-x64
3QTranslate.exe
windows10-2004-x64
3Services/A...ice.js
windows7-x64
3Services/A...ice.js
windows10-2004-x64
3Services/B...ice.js
windows7-x64
3Services/B...ice.js
windows10-2004-x64
3Services/B...ice.js
windows7-x64
3Services/B...ice.js
windows10-2004-x64
3Services/B...ice.js
windows7-x64
3Services/B...ice.js
windows10-2004-x64
3Services/Common.js
windows7-x64
3Services/Common.js
windows10-2004-x64
3Services/D...ice.js
windows7-x64
3Services/D...ice.js
windows10-2004-x64
3Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 06:03
Static task
static1
Behavioral task
behavioral1
Sample
f9daf9075d1c85e330703ec0dae7119f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f9daf9075d1c85e330703ec0dae7119f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral9
Sample
License.rtf
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
License.rtf
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Plugins/History/Csv.js
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Plugins/History/Csv.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Plugins/History/Html.js
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Plugins/History/Html.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Plugins/History/Json.js
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
Plugins/History/Json.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Plugins/History/Txt.js
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Plugins/History/Txt.js
Resource
win10v2004-20240910-en
Behavioral task
behavioral19
Sample
QTranslate.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
QTranslate.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
Services/ABBYY Lingvo Live/Service.js
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Services/ABBYY Lingvo Live/Service.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
Services/Babylon Dictionary/Service.js
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Services/Babylon Dictionary/Service.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
Services/Babylon/Service.js
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Services/Babylon/Service.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
Services/Baidu/Service.js
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Services/Baidu/Service.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
Services/Common.js
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Services/Common.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
Services/DeepL/Service.js
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Services/DeepL/Service.js
Resource
win10v2004-20240802-en
General
-
Target
License.rtf
-
Size
4KB
-
MD5
b673ad39ce7ff047b492ec651d84c777
-
SHA1
67c94925d4ccb910f0c135b830bc122cb33d5a1c
-
SHA256
f7b42b543592fa59fda4e0cc23de7814c5e64ceea7031222636451242bb9bf62
-
SHA512
525edfb0c655138af6add9907dbe8f40042117c9c7fc7357fc24945f063a35b8b5bcef23b9d520c7dd13cd2329aa5ca6217d4423864acf5e3322ea8c84b97ea3
-
SSDEEP
96:MCWqJw2EY5JVSFXbwx2ABdDhYki4s9CE6bYuGI9bK6Xlcg6tRkU4qfKzt3fKO2:YquRFXbwx2sdFYki4k96bYm9uolZSRkS
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2532 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2532 WINWORD.EXE 2532 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2892 2532 WINWORD.EXE 32 PID 2532 wrote to memory of 2892 2532 WINWORD.EXE 32 PID 2532 wrote to memory of 2892 2532 WINWORD.EXE 32 PID 2532 wrote to memory of 2892 2532 WINWORD.EXE 32
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\License.rtf"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD5801915c8a9da2e211f7aa70d1e8f1b22
SHA11f83128995f3f8f52083fb7fe3061ab8f72835f9
SHA256c2edaa60427e6466431308a57108d66051b8dffdfb594d78a45ab3fb48a5390a
SHA51230d5b03fbc0ac5bbc1e6b08b8e08a16480ddd9d99e6b21e0455f60cfbe5800bc5259060ff65bbacd2ec8c4f97b67200e0ff180c0dfed2a8e0616384228c859de