Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 02:21
Behavioral task
behavioral1
Sample
0d78ac5b9781c5c8e45e604adb6aad53_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0d78ac5b9781c5c8e45e604adb6aad53_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0d78ac5b9781c5c8e45e604adb6aad53_JaffaCakes118.exe
-
Size
89KB
-
MD5
0d78ac5b9781c5c8e45e604adb6aad53
-
SHA1
ce9e7a628019a5fb59787515968824c39559d58f
-
SHA256
a866ece54a8608394d8019d4786ad943f3f42a0685c4dc7b085621bb8d8c1f98
-
SHA512
3b712bf801b42427c5f3524259dcbbc7c9a2ed6bc87fa1af35347c8feda2df92a4cd2d8e4f60fb2eaa8b77d650e46fc0c0b115ddb07886d1b7ee7555a01cbb78
-
SSDEEP
1536:6mi+xxdgF45E4h2Hnq8OFnouy8CBZVDYTwtaRdoYVJ42PD08sLBvD6:6mi+/dgy5Ef8doutaZZYCajVJ4KgvD
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 2744 osk.exe 2808 WINWORD.EXE 2072 WINWORD.EXE 2076 WINWORD.EXE 2432 WINWORD.EXE 1268 WINWORD.EXE -
Loads dropped DLL 12 IoCs
pid Process 2628 0d78ac5b9781c5c8e45e604adb6aad53_JaffaCakes118.exe 2628 0d78ac5b9781c5c8e45e604adb6aad53_JaffaCakes118.exe 2744 osk.exe 2744 osk.exe 2808 WINWORD.EXE 2808 WINWORD.EXE 2072 WINWORD.EXE 2072 WINWORD.EXE 2076 WINWORD.EXE 2076 WINWORD.EXE 2432 WINWORD.EXE 2432 WINWORD.EXE -
Drops file in System32 directory 19 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\WINWORD.exe WINWORD.EXE File opened for modification C:\Windows\SysWOW64\PushDismount.enc WINWORD.EXE File opened for modification C:\Windows\SysWOW64\WINWORD.exe WINWORD.EXE File opened for modification C:\Windows\SysWOW64\WINWORD.EXE WINWORD.EXE File opened for modification C:\Windows\SysWOW64\WINWORD.EXE WINWORD.EXE File opened for modification C:\Windows\SysWOW64\Com\ctfmoon.exe WINWORD.EXE File opened for modification C:\Windows\SysWOW64\WINWORD.exe WINWORD.EXE File opened for modification C:\Windows\SysWOW64\WINWORD.exe WINWORD.EXE File opened for modification C:\Windows\SysWOW64\Com\ctfmoon.exe WINWORD.EXE File opened for modification C:\Windows\SysWOW64\WINWORD.EXE WINWORD.EXE File opened for modification C:\Windows\SysWOW64\Com\ctfmoon.exe osk.exe File opened for modification C:\Windows\SysWOW64\ConvertNew.enc WINWORD.EXE File opened for modification C:\Windows\SysWOW64\GrantUse.enc WINWORD.EXE File opened for modification C:\Windows\SysWOW64\JoinEnter.enc WINWORD.EXE File opened for modification C:\Windows\SysWOW64\UnblockProtect.enc WINWORD.EXE File opened for modification C:\Windows\SysWOW64\Com\ctfmoon.exe WINWORD.EXE File opened for modification C:\Windows\SysWOW64\WINWORD.EXE osk.exe File opened for modification C:\Windows\SysWOW64\WINWORD.EXE WINWORD.EXE File opened for modification C:\Windows\SysWOW64\Com\ctfmoon.exe WINWORD.EXE -
resource yara_rule behavioral1/memory/2628-0-0x0000000011000000-0x000000001102F000-memory.dmp upx behavioral1/files/0x000f0000000193be-15.dat upx behavioral1/memory/2628-21-0x0000000011000000-0x000000001102F000-memory.dmp upx behavioral1/memory/2744-19-0x0000000011000000-0x000000001102F000-memory.dmp upx behavioral1/memory/2744-40-0x0000000011000000-0x000000001102F000-memory.dmp upx behavioral1/memory/2808-65-0x0000000011000000-0x000000001102F000-memory.dmp upx behavioral1/memory/2072-75-0x0000000011000000-0x000000001102F000-memory.dmp upx behavioral1/memory/2076-84-0x0000000011000000-0x000000001102F000-memory.dmp upx behavioral1/memory/2432-97-0x0000000011000000-0x000000001102F000-memory.dmp upx behavioral1/memory/1268-98-0x0000000011000000-0x000000001102F000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language osk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0d78ac5b9781c5c8e45e604adb6aad53_JaffaCakes118.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2188 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2744 osk.exe 2744 osk.exe 2808 WINWORD.EXE 2072 WINWORD.EXE 2076 WINWORD.EXE 2432 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2628 0d78ac5b9781c5c8e45e604adb6aad53_JaffaCakes118.exe 2744 osk.exe 2188 WINWORD.EXE 2188 WINWORD.EXE 2808 WINWORD.EXE 2188 WINWORD.EXE 2072 WINWORD.EXE 2076 WINWORD.EXE 2432 WINWORD.EXE 1268 WINWORD.EXE -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2628 wrote to memory of 2188 2628 0d78ac5b9781c5c8e45e604adb6aad53_JaffaCakes118.exe 30 PID 2628 wrote to memory of 2188 2628 0d78ac5b9781c5c8e45e604adb6aad53_JaffaCakes118.exe 30 PID 2628 wrote to memory of 2188 2628 0d78ac5b9781c5c8e45e604adb6aad53_JaffaCakes118.exe 30 PID 2628 wrote to memory of 2188 2628 0d78ac5b9781c5c8e45e604adb6aad53_JaffaCakes118.exe 30 PID 2628 wrote to memory of 2744 2628 0d78ac5b9781c5c8e45e604adb6aad53_JaffaCakes118.exe 31 PID 2628 wrote to memory of 2744 2628 0d78ac5b9781c5c8e45e604adb6aad53_JaffaCakes118.exe 31 PID 2628 wrote to memory of 2744 2628 0d78ac5b9781c5c8e45e604adb6aad53_JaffaCakes118.exe 31 PID 2628 wrote to memory of 2744 2628 0d78ac5b9781c5c8e45e604adb6aad53_JaffaCakes118.exe 31 PID 2744 wrote to memory of 2808 2744 osk.exe 32 PID 2744 wrote to memory of 2808 2744 osk.exe 32 PID 2744 wrote to memory of 2808 2744 osk.exe 32 PID 2744 wrote to memory of 2808 2744 osk.exe 32 PID 2808 wrote to memory of 2072 2808 WINWORD.EXE 33 PID 2808 wrote to memory of 2072 2808 WINWORD.EXE 33 PID 2808 wrote to memory of 2072 2808 WINWORD.EXE 33 PID 2808 wrote to memory of 2072 2808 WINWORD.EXE 33 PID 2072 wrote to memory of 2076 2072 WINWORD.EXE 34 PID 2072 wrote to memory of 2076 2072 WINWORD.EXE 34 PID 2072 wrote to memory of 2076 2072 WINWORD.EXE 34 PID 2072 wrote to memory of 2076 2072 WINWORD.EXE 34 PID 2076 wrote to memory of 2432 2076 WINWORD.EXE 35 PID 2076 wrote to memory of 2432 2076 WINWORD.EXE 35 PID 2076 wrote to memory of 2432 2076 WINWORD.EXE 35 PID 2076 wrote to memory of 2432 2076 WINWORD.EXE 35 PID 2432 wrote to memory of 1268 2432 WINWORD.EXE 36 PID 2432 wrote to memory of 1268 2432 WINWORD.EXE 36 PID 2432 wrote to memory of 1268 2432 WINWORD.EXE 36 PID 2432 wrote to memory of 1268 2432 WINWORD.EXE 36 PID 2188 wrote to memory of 532 2188 WINWORD.EXE 38 PID 2188 wrote to memory of 532 2188 WINWORD.EXE 38 PID 2188 wrote to memory of 532 2188 WINWORD.EXE 38 PID 2188 wrote to memory of 532 2188 WINWORD.EXE 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d78ac5b9781c5c8e45e604adb6aad53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0d78ac5b9781c5c8e45e604adb6aad53_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\Temp\_$Cf\0d78ac5b9781c5c8e45e604adb6aad53_JaffaCakes118 .doc"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:532
-
-
-
C:\Windows\Temp\_$Cf\osk.exe"C:\Windows\Temp\_$Cf\osk.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\WINWORD.EXE"C:\Windows\system32\WINWORD.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\WINWORD.EXE"C:\Windows\system32\WINWORD.EXE"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\WINWORD.EXE"C:\Windows\system32\WINWORD.EXE"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\WINWORD.EXE"C:\Windows\system32\WINWORD.EXE"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\WINWORD.EXE"C:\Windows\system32\WINWORD.EXE"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1268
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD591261052d56fa73ceb897f86b4664b92
SHA1280be6ac485213d346d0d0b96895aab042934217
SHA256ef333c2f0f8a8ea135d390f5aef45e913bce2f2a09e6aba93af675d5ca2df0c7
SHA5126fcbfd615609d78a21ebdabbdd050de080f76b5bcb38ce3fa446d8520e0385691f1d5a13184645323cf3293e17b88033127636a86edd483ea79ccaaca46963b3
-
Filesize
74KB
MD5862a96836fe55f230039047fc1897b6f
SHA156a56c039d90714cefe7d2e7bb02e13c2b04764c
SHA2560044b6448afbf8cce1057d5226b4baf27708656d9245f06dc9408956ced0cb21
SHA512d6e77acb572339746797cfb9fd62b90fbcef4590f47eba5db538e97f7535326266b8146e120983d35a0978298083ffae90714ce119ef9c456b428374d288d574