Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29/03/2025, 17:09

General

  • Target

    JaffaCakes118_8c120943add288cf7ef47f8ced808a6d.doc

  • Size

    7KB

  • MD5

    8c120943add288cf7ef47f8ced808a6d

  • SHA1

    d3e7420aa7e732e4cc312ce5bdb0f92f02d60187

  • SHA256

    22d50cb5ac049f9bac8f0ec69d8bee2aa2d22f1fb3bc74fcc88dce12dec3c51a

  • SHA512

    72a0671b5cf870aaeebc1ef405dee339cc3561881a3f0fa3b8e6314c069b43d3b0adff7cbbbae0bb067030e57307344be919e11abe366425939dc97d4ccb085c

  • SSDEEP

    96:hjhdT141k1p1UUpEO9PMvbVxxYEcf6djgdZ6C:RdUYff+OhIVxxWfkjKZv

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 47 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8c120943add288cf7ef47f8ced808a6d.doc"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:296

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\VB422F.tmp

    Filesize

    1KB

    MD5

    858ab85c0ef02983f74327244dbf0df9

    SHA1

    004cb0e65399bea7ac4c70605ba71192a0e464ef

    SHA256

    2c9967130ef336a16bf5200d4505eef4dc66db05c92aef087f9918eee180254c

    SHA512

    ad14675785d97d57680f4390f7e68bf163bc41833c55041c3096d3fc94e6aba0dfb8854ff60db8bda3978cb998c910dd6d24c92b3d23521fbccf1464d656858f

  • C:\Users\Admin\AppData\Local\Temp\VB4242.tmp

    Filesize

    124B

    MD5

    7be15b54fc6572576aff113d9abb5286

    SHA1

    6b7a700b01d2962b31f28375a5279c86ae3e6913

    SHA256

    ed17fc5ea9be31212a8c010caad36e72c44a0d1d08ca3e7795e459fa21fea682

    SHA512

    7701bc86898aa959671d671646b2dc9f1b8c6103a5f624d310641123694e776c6a843c5b6de844f9ca04521f4094f6576aa10c6f6e939f3493ca513304a5ce82

  • C:\Users\Admin\AppData\Local\Temp\VB4245.tmp

    Filesize

    125B

    MD5

    f318e46e369dee86f22b67e80dcd3ecc

    SHA1

    0a314ce51d2e8d448cd3950f6916d23f780b46ef

    SHA256

    db2c390946beb03ab7edf5bb6cf4badadd56a211ec3f506d88f9ef14eb52e15a

    SHA512

    c5fe311caf88306f25451709088e96f76d10591c9e5af9d89a94673c2e07f7c2845874c71e6ad0342db1ab509664f1e3177bd279bcb38988efb9823cae25af14

  • C:\Users\Admin\AppData\Local\Temp\VB4248.tmp

    Filesize

    916B

    MD5

    a408e4a620f0d233e97ec8d51aea5cf3

    SHA1

    b303d265de5a32c93b7c3010191e4aa92477644e

    SHA256

    ea541820a10e963493c26c491fa3d61aac409505368099fea2bd9a60fc4436b3

    SHA512

    2f319aba3d1a7b47c1c3d4181acef7a7e309ddc2c9a2db0dc982bc23bcf2b8324df8e24597619c62b00b28ff075cf49f107d9b45ef2b11e3fbde034142ff160a

  • C:\Users\Admin\AppData\Local\Temp\VB426A.tmp

    Filesize

    629B

    MD5

    a2d2e0c9847b9bcc8d1a4ea50f1fad2a

    SHA1

    701634092f32d64f4afbcd39890af1976687b22f

    SHA256

    e4fe21fc69878fb24570c1c3546c3e202d389a19010f1e5fdbcd78fb020bad2f

    SHA512

    7d8d2538073c3ab775b0342fb2ebf8c37f897319e7180d9fa72f32e3fdebcef4a20b7a2b87829d0636aa9f498650d668825bbb6c9665246d74944e7bf380af7c

  • memory/296-0-0x000000002FC01000-0x000000002FC02000-memory.dmp

    Filesize

    4KB

  • memory/296-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/296-2-0x0000000070AFD000-0x0000000070B08000-memory.dmp

    Filesize

    44KB

  • memory/296-6-0x0000000006B20000-0x0000000006C20000-memory.dmp

    Filesize

    1024KB

  • memory/296-42-0x0000000070AFD000-0x0000000070B08000-memory.dmp

    Filesize

    44KB

  • memory/296-43-0x00000000084B0000-0x00000000084B2000-memory.dmp

    Filesize

    8KB

  • memory/296-44-0x0000000006B20000-0x0000000006C20000-memory.dmp

    Filesize

    1024KB