Analysis

  • max time kernel
    127s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/03/2025, 14:02

General

  • Target

    JaffaCakes118_89cf381e29f7a07a46372231f7259e4c.doc

  • Size

    11KB

  • MD5

    89cf381e29f7a07a46372231f7259e4c

  • SHA1

    e292a81fc5ea9c46fada2242b8fe8fe75b1de7c2

  • SHA256

    2ae0ee7dbf11eccf50df89b5ae3a87a71a7d69022091154d5886790b2510ad86

  • SHA512

    df192d1658903ea6784ae7ea2933851ddf59a26cb82bf222bc4fc5afb359ad54d7d64d6e0b979bc54dd25aaf4769a11fa44393167cafb71471d662ab60a2be59

  • SSDEEP

    48:rzllllz2N9FGxVGECvat0wqcWxO5b0UvdgX0Sf1:z2N9SnCNhcmoI0Sf1

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_89cf381e29f7a07a46372231f7259e4c.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:5596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_89cf381e29f7a07a46372231f7259e4c.dot

    Filesize

    33KB

    MD5

    1ca02e965609cc908f15c62a70f4b7af

    SHA1

    d7fdd0fd121adea901a3ea6519079a67b10a4b6c

    SHA256

    9307ef993e8f6d5447c63c07dd7ee32f3f4f0b540e86f1702e30dfa913750342

    SHA512

    1e6d3d423be259b59545be9b872988c197b7cbb6de0c0127737bbdbc4a2919f0109bcb5c8943abe0941cc776237ea9fda42307c2b2c9da65d7c9cef8ac7dd670

  • C:\Users\Admin\AppData\Local\Temp\TCD35B9.tmp\sist02.xsl

    Filesize

    245KB

    MD5

    f883b260a8d67082ea895c14bf56dd56

    SHA1

    7954565c1f243d46ad3b1e2f1baf3281451fc14b

    SHA256

    ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

    SHA512

    d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    1KB

    MD5

    a29618dc5b0ac4da62f4b992488e218e

    SHA1

    742135eb841e6b40c3d1136aac16da24318c4301

    SHA256

    2c6293260b58836636b0d32747efeafde27adc015d6f93714b0aad77be165bd7

    SHA512

    ae6f7e167437a518249f22f06576af0730ea0d4c7be9633176e4e035bfd4a7c29523de60f3d64fd704bb7da5d1b8a55de93d00bce5897a95a4da4c05cf0abb60

  • memory/5596-5-0x00007FFF87C70000-0x00007FFF87E65000-memory.dmp

    Filesize

    2.0MB

  • memory/5596-13-0x00007FFF453C0000-0x00007FFF453D0000-memory.dmp

    Filesize

    64KB

  • memory/5596-8-0x00007FFF87C70000-0x00007FFF87E65000-memory.dmp

    Filesize

    2.0MB

  • memory/5596-3-0x00007FFF87D0D000-0x00007FFF87D0E000-memory.dmp

    Filesize

    4KB

  • memory/5596-4-0x00007FFF47CF0000-0x00007FFF47D00000-memory.dmp

    Filesize

    64KB

  • memory/5596-9-0x00007FFF87C70000-0x00007FFF87E65000-memory.dmp

    Filesize

    2.0MB

  • memory/5596-11-0x00007FFF87C70000-0x00007FFF87E65000-memory.dmp

    Filesize

    2.0MB

  • memory/5596-10-0x00007FFF87C70000-0x00007FFF87E65000-memory.dmp

    Filesize

    2.0MB

  • memory/5596-12-0x00007FFF453C0000-0x00007FFF453D0000-memory.dmp

    Filesize

    64KB

  • memory/5596-14-0x00007FFF87C70000-0x00007FFF87E65000-memory.dmp

    Filesize

    2.0MB

  • memory/5596-15-0x00007FFF87C70000-0x00007FFF87E65000-memory.dmp

    Filesize

    2.0MB

  • memory/5596-6-0x00007FFF87C70000-0x00007FFF87E65000-memory.dmp

    Filesize

    2.0MB

  • memory/5596-30-0x00007FFF87C70000-0x00007FFF87E65000-memory.dmp

    Filesize

    2.0MB

  • memory/5596-31-0x00007FFF87C70000-0x00007FFF87E65000-memory.dmp

    Filesize

    2.0MB

  • memory/5596-38-0x00007FFF87C70000-0x00007FFF87E65000-memory.dmp

    Filesize

    2.0MB

  • memory/5596-7-0x00007FFF47CF0000-0x00007FFF47D00000-memory.dmp

    Filesize

    64KB

  • memory/5596-0-0x00007FFF47CF0000-0x00007FFF47D00000-memory.dmp

    Filesize

    64KB

  • memory/5596-1-0x00007FFF47CF0000-0x00007FFF47D00000-memory.dmp

    Filesize

    64KB

  • memory/5596-2-0x00007FFF47CF0000-0x00007FFF47D00000-memory.dmp

    Filesize

    64KB

  • memory/5596-392-0x00007FFF47CF0000-0x00007FFF47D00000-memory.dmp

    Filesize

    64KB

  • memory/5596-391-0x00007FFF47CF0000-0x00007FFF47D00000-memory.dmp

    Filesize

    64KB

  • memory/5596-394-0x00007FFF47CF0000-0x00007FFF47D00000-memory.dmp

    Filesize

    64KB

  • memory/5596-393-0x00007FFF47CF0000-0x00007FFF47D00000-memory.dmp

    Filesize

    64KB

  • memory/5596-395-0x00007FFF87C70000-0x00007FFF87E65000-memory.dmp

    Filesize

    2.0MB