Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 07:40
Static task
static1
Behavioral task
behavioral1
Sample
126e4d1390b6825a53241d5cbb7caf40_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
126e4d1390b6825a53241d5cbb7caf40_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
126e4d1390b6825a53241d5cbb7caf40_JaffaCakes118.exe
-
Size
35KB
-
MD5
126e4d1390b6825a53241d5cbb7caf40
-
SHA1
b61d63ff42c5669e7762005ec251a0f00c683a1f
-
SHA256
4ffc19ccf74ac80e82ab965db7b7175807b3c3809cbebb51cd09fbbc1a707282
-
SHA512
aa13d7a153887b299e0f0285f613c15e40cfd062bf4dcd24dc85605679804ee31a3e84c6747b73fa945358e55f62f989b6e350deba46f7e553478ba46eba81e5
-
SSDEEP
768:g55s1wk5Z3mb5K3pYlC2HxD8oAaOBRuYk:g553kq03pYl9HZuC
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 126e4d1390b6825a53241d5cbb7caf40_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2564 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2564 WINWORD.EXE 2564 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2564 1628 126e4d1390b6825a53241d5cbb7caf40_JaffaCakes118.exe 30 PID 1628 wrote to memory of 2564 1628 126e4d1390b6825a53241d5cbb7caf40_JaffaCakes118.exe 30 PID 1628 wrote to memory of 2564 1628 126e4d1390b6825a53241d5cbb7caf40_JaffaCakes118.exe 30 PID 1628 wrote to memory of 2564 1628 126e4d1390b6825a53241d5cbb7caf40_JaffaCakes118.exe 30 PID 2564 wrote to memory of 1720 2564 WINWORD.EXE 31 PID 2564 wrote to memory of 1720 2564 WINWORD.EXE 31 PID 2564 wrote to memory of 1720 2564 WINWORD.EXE 31 PID 2564 wrote to memory of 1720 2564 WINWORD.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\126e4d1390b6825a53241d5cbb7caf40_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\126e4d1390b6825a53241d5cbb7caf40_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\126e4d1390b6825a53241d5cbb7caf40_JaffaCakes118.rtf"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1720
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD52a99e0b32df85e6ee961d1078449f553
SHA19e00cee25cad917140a0cf6e14fd26e0789b3c37
SHA2562efe3bb53346daeabdbcd1e728106f5403697ee072ff7073155b0545e831b262
SHA512887406f13b9df67c3eb5a1d63e82ea73bb4e4f5de8911545966d33a2c9d9b1a11483e3196c55282897ba9b9011eb23a501bbd914e0bf63cc375c06cc5a1e0d42