Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 16:59
Static task
static1
Behavioral task
behavioral1
Sample
3b1ecbfcd9de228e13c27565e64739eb_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3b1ecbfcd9de228e13c27565e64739eb_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3b1ecbfcd9de228e13c27565e64739eb_JaffaCakes118.exe
-
Size
49KB
-
MD5
3b1ecbfcd9de228e13c27565e64739eb
-
SHA1
a10c2560a088d9c7f6a9795934b8468d609085fb
-
SHA256
eb4e8536af6bfdf9550934663be9f6ce73d1ae152a48e56acd19a761b7ae5ae6
-
SHA512
6664a33cb339715031c2752f452b6d2e346333884ebf30b1048225ae182e5150dbdaae8709f342afdab21111802d067ee7a32d252cf3925389023a832d927148
-
SSDEEP
768:aK+do4CrsI6/csHOw+rH545WsH4Xms9+DYw1JG9qKvGAFgqd8G4N4mdS2:aKPuOwoZ45f4+DYqw9qSqwa4m
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3b1ecbfcd9de228e13c27565e64739eb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2560 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2560 WINWORD.EXE 2560 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2560 2536 3b1ecbfcd9de228e13c27565e64739eb_JaffaCakes118.exe 30 PID 2536 wrote to memory of 2560 2536 3b1ecbfcd9de228e13c27565e64739eb_JaffaCakes118.exe 30 PID 2536 wrote to memory of 2560 2536 3b1ecbfcd9de228e13c27565e64739eb_JaffaCakes118.exe 30 PID 2536 wrote to memory of 2560 2536 3b1ecbfcd9de228e13c27565e64739eb_JaffaCakes118.exe 30 PID 2560 wrote to memory of 2740 2560 WINWORD.EXE 32 PID 2560 wrote to memory of 2740 2560 WINWORD.EXE 32 PID 2560 wrote to memory of 2740 2560 WINWORD.EXE 32 PID 2560 wrote to memory of 2740 2560 WINWORD.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b1ecbfcd9de228e13c27565e64739eb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3b1ecbfcd9de228e13c27565e64739eb_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\3b1ecbfcd9de228e13c27565e64739eb_JaffaCakes118.rtf"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2740
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5284850baa4906da63dd3c4d6b835fb03
SHA1d2929834b25db5f679a5f7026c5da6cec153f7ce
SHA256e9cb60622d4f5228466f5fb9bf06a5da1668097c6bdcb9088cb6040372845492
SHA512234e855adea91e902bfc1d407bd95498c7a84e55ed077171291957e5940c69b0ef6a35a40e8e60eb4709f029fcec0f75ef65f92e4505ce69bc7239736042a6e0