Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 07:12
Static task
static1
Behavioral task
behavioral1
Sample
2d04929a36bfaf6d69e76c75a81ee427_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2d04929a36bfaf6d69e76c75a81ee427_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2d04929a36bfaf6d69e76c75a81ee427_JaffaCakes118.exe
-
Size
167KB
-
MD5
2d04929a36bfaf6d69e76c75a81ee427
-
SHA1
d02616098812273a3baf2f0af0eb5bb0cc6e6b44
-
SHA256
1339f665e134a0ccdaaad982fd8c4abd6974af29f8b447dfa7fc92eda9849ab2
-
SHA512
d1bbfba2ce008f560a4cef6e1ef295c5833e684935632bb4918ca3e6d00d8760d18484b68699c4b72cc801081d62ce46597b6fab4bb02b439053084947562f48
-
SSDEEP
3072:swA7rZCG4AtCGMbqSEmvbTD/h2+uZXWyPumWZ7jXI8ybu:sBH+vL/h2jz7WFjXIXC
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1336 DOCtoEXE.exe 1592 2d04929a36bfaf6d69e76c75a81ee427_JaffaCakes118.exe -
Loads dropped DLL 2 IoCs
pid Process 2180 2d04929a36bfaf6d69e76c75a81ee427_JaffaCakes118.exe 1336 DOCtoEXE.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d04929a36bfaf6d69e76c75a81ee427_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DOCtoEXE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d04929a36bfaf6d69e76c75a81ee427_JaffaCakes118.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 264 WINWORD.EXE 264 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2180 2d04929a36bfaf6d69e76c75a81ee427_JaffaCakes118.exe 1336 DOCtoEXE.exe 264 WINWORD.EXE 264 WINWORD.EXE 264 WINWORD.EXE 1592 2d04929a36bfaf6d69e76c75a81ee427_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2180 wrote to memory of 1336 2180 2d04929a36bfaf6d69e76c75a81ee427_JaffaCakes118.exe 84 PID 2180 wrote to memory of 1336 2180 2d04929a36bfaf6d69e76c75a81ee427_JaffaCakes118.exe 84 PID 2180 wrote to memory of 1336 2180 2d04929a36bfaf6d69e76c75a81ee427_JaffaCakes118.exe 84 PID 1336 wrote to memory of 1592 1336 DOCtoEXE.exe 92 PID 1336 wrote to memory of 1592 1336 DOCtoEXE.exe 92 PID 1336 wrote to memory of 1592 1336 DOCtoEXE.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d04929a36bfaf6d69e76c75a81ee427_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2d04929a36bfaf6d69e76c75a81ee427_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\DOCtoEXE241009183024_tmp\DOCtoEXE.exeC:\Users\Admin\AppData\Local\Temp\DOCtoEXE241009183024_tmp\DOCtoEXE.exe cmd/CallFromZipBase /C:\Users\Admin\AppData\Local\Temp\2d04929a36bfaf6d69e76c75a81ee427_JaffaCakes118.exe /156114 /171978 /C:\Users\Admin\AppData\Local\Temp\DOCtoEXE241009183024_tmp\ /2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\2d04929a36bfaf6d69e76c75a81ee427_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\2d04929a36bfaf6d69e76c75a81ee427_JaffaCakes118.exe cmd/del /C:\Users\Admin\AppData\Local\Temp\DOCtoEXE241009183024_tmp\3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1592
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
167KB
MD52d04929a36bfaf6d69e76c75a81ee427
SHA1d02616098812273a3baf2f0af0eb5bb0cc6e6b44
SHA2561339f665e134a0ccdaaad982fd8c4abd6974af29f8b447dfa7fc92eda9849ab2
SHA512d1bbfba2ce008f560a4cef6e1ef295c5833e684935632bb4918ca3e6d00d8760d18484b68699c4b72cc801081d62ce46597b6fab4bb02b439053084947562f48
-
Filesize
140KB
MD5308b594351ac2524bf91c01d02dddc3e
SHA13fa31b46fb0ff4674a32cccc92c9a3cc69b43b9c
SHA256a3009ac5d7cf984a83ae099b77c2575663fc47702dc75b2c195b97fb6f07cf91
SHA5127e8d796c618bdfa10d982c5b4b0da0783ae43171cfc1e383ac3ee1b49a8257fedadb04db0e367005f87596afcedcbd712d84c7f9fdda2f94096006859921f2db
-
Filesize
44KB
MD5bc3c12b28a333cf1b74ea0c0b8e3a64c
SHA160f9f155335d59a32c08c7cc4c3a6ec23641ba83
SHA256286a1c9e52bb626d7a0abb9fc94d9e24ea52bab3d8efad3356d3a83782e9a030
SHA512813f65d4f5a9c2b1f4ff5f88b5b3709faa433e1d1d36d894eed5886b7039594cc7d91aea6dc605376b5fb170bd6d3826237054441805c816acc598b0aa6d219e
-
Filesize
72KB
MD54efaa53c545f4ffb1ee0ed1709c15ea7
SHA1076b2d31e24fe8cfb56f9c292fd6ca1402be79b2
SHA25621582b3a68e8753322a1b1c7e550ae7fd305de4935de68fbde9f87570f484d00
SHA5127fa8c0954729ea14fdceb788393c3de6e139fc4c480b84183863f62afacec2d6bbc0993b601a4a74c87bc89338b627dc37a18be309d090bae880ea10ab9d7314