Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29/03/2025, 18:36

General

  • Target

    JaffaCakes118_92054c01970b62380f0f26e2b06406d9.doc

  • Size

    74KB

  • MD5

    92054c01970b62380f0f26e2b06406d9

  • SHA1

    b26caefffcc90d717904d886eed5417756c76d9a

  • SHA256

    9a6d49a1eb36b4b37953b4f46cab5bcb2a0a72857c29df3ba287c26995336c13

  • SHA512

    e8fca143d648f6bdaecab0117a988762502b87dafbfbcb3b1e89573101088a587b410f56dedf99c0e9dfdeadbfa2e0da4ab85fa715de66548e3c303fa088d791

  • SSDEEP

    768:cQW+oPDOmiWaWzqlqlaV7a7jQ9dD3CJm0w9hVZzZri6Af2phYOpHKv5RQE:cjTPZU3E7k9BSwPVZzZm5f2phLYxRQE

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_92054c01970b62380f0f26e2b06406d9.doc"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\VB9E24.tmp

    Filesize

    4KB

    MD5

    2bb2729779f99fb579766031dfd940e0

    SHA1

    3ab21aca682060167bf8fbde838bc33493e7c9f3

    SHA256

    84f00033163d58ebeb1abffea96a6b5bf6396d3bbdf07c690633650d80dfb082

    SHA512

    e9ab01c82a82cf012ff5a991e31adf745bcd95b083dc12b9d701f553c7d97e875749948caeb4bdacf44bc118a941fa12cb6e3679dca2e2defe7427da755a0ccd

  • memory/3056-51-0x0000000000410000-0x0000000000510000-memory.dmp

    Filesize

    1024KB

  • memory/3056-22-0x0000000000410000-0x0000000000510000-memory.dmp

    Filesize

    1024KB

  • memory/3056-7-0x0000000000410000-0x0000000000510000-memory.dmp

    Filesize

    1024KB

  • memory/3056-6-0x0000000000410000-0x0000000000510000-memory.dmp

    Filesize

    1024KB

  • memory/3056-5-0x0000000000410000-0x0000000000510000-memory.dmp

    Filesize

    1024KB

  • memory/3056-8-0x0000000000410000-0x0000000000510000-memory.dmp

    Filesize

    1024KB

  • memory/3056-15-0x0000000000410000-0x0000000000510000-memory.dmp

    Filesize

    1024KB

  • memory/3056-9-0x0000000000410000-0x0000000000510000-memory.dmp

    Filesize

    1024KB

  • memory/3056-10-0x0000000000410000-0x0000000000510000-memory.dmp

    Filesize

    1024KB

  • memory/3056-28-0x00000000064F0000-0x00000000065F0000-memory.dmp

    Filesize

    1024KB

  • memory/3056-21-0x0000000000410000-0x0000000000510000-memory.dmp

    Filesize

    1024KB

  • memory/3056-26-0x0000000000410000-0x0000000000510000-memory.dmp

    Filesize

    1024KB

  • memory/3056-25-0x0000000000410000-0x0000000000510000-memory.dmp

    Filesize

    1024KB

  • memory/3056-24-0x0000000000410000-0x0000000000510000-memory.dmp

    Filesize

    1024KB

  • memory/3056-23-0x0000000000410000-0x0000000000510000-memory.dmp

    Filesize

    1024KB

  • memory/3056-0-0x000000002F081000-0x000000002F082000-memory.dmp

    Filesize

    4KB

  • memory/3056-2-0x000000007131D000-0x0000000071328000-memory.dmp

    Filesize

    44KB

  • memory/3056-29-0x0000000000410000-0x0000000000510000-memory.dmp

    Filesize

    1024KB

  • memory/3056-27-0x0000000000410000-0x0000000000510000-memory.dmp

    Filesize

    1024KB

  • memory/3056-118-0x0000000000410000-0x0000000000510000-memory.dmp

    Filesize

    1024KB

  • memory/3056-117-0x0000000000410000-0x0000000000510000-memory.dmp

    Filesize

    1024KB

  • memory/3056-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/3056-20-0x0000000000410000-0x0000000000510000-memory.dmp

    Filesize

    1024KB

  • memory/3056-19-0x0000000000410000-0x0000000000510000-memory.dmp

    Filesize

    1024KB

  • memory/3056-18-0x0000000000410000-0x0000000000510000-memory.dmp

    Filesize

    1024KB

  • memory/3056-17-0x0000000000410000-0x0000000000510000-memory.dmp

    Filesize

    1024KB

  • memory/3056-16-0x0000000000410000-0x0000000000510000-memory.dmp

    Filesize

    1024KB

  • memory/3056-14-0x0000000000410000-0x0000000000510000-memory.dmp

    Filesize

    1024KB

  • memory/3056-13-0x0000000000410000-0x0000000000510000-memory.dmp

    Filesize

    1024KB

  • memory/3056-12-0x0000000000410000-0x0000000000510000-memory.dmp

    Filesize

    1024KB

  • memory/3056-11-0x0000000000410000-0x0000000000510000-memory.dmp

    Filesize

    1024KB

  • memory/3056-187-0x000000007131D000-0x0000000071328000-memory.dmp

    Filesize

    44KB

  • memory/3056-188-0x0000000000410000-0x0000000000510000-memory.dmp

    Filesize

    1024KB

  • memory/3056-189-0x0000000000410000-0x0000000000510000-memory.dmp

    Filesize

    1024KB