Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29/03/2025, 19:38

General

  • Target

    JaffaCakes118_9542beebc4df3923f8558000ed2d36da.doc

  • Size

    41KB

  • MD5

    9542beebc4df3923f8558000ed2d36da

  • SHA1

    3fecd4c7583a95bad5a5e91da0a35a4c2b6bb672

  • SHA256

    322542c31491f3b6c156eeec325e7157e7f2c45b76635a5c7f099a8bb391a456

  • SHA512

    9ea4e5b81c4577aef5cce21599a0d08a8f8e4153e246cb72fab3765e11c271016225e954fc07324d25b1f4cf652375c1f469e78dfbd7890aeeae055508adaef8

  • SSDEEP

    384:mSh1Iq9OYvNBuCm68dajNA2gV2/elFL2f3jDswi:mSh1IeBfv8daxjgon

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9542beebc4df3923f8558000ed2d36da.doc"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2252

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\VBC37F.tmp

    Filesize

    5KB

    MD5

    8431a989d54186d81fc63e5c82453a4d

    SHA1

    d52da246d9e5619b23d7fa3ec3ff4f0904ab8ed3

    SHA256

    8ff80eb67db14885e5921f1fbed6c9a6fa64b921090b469c861ceccb903e417f

    SHA512

    3afde461482c78d868a13ee3106da41f6f1722f739aff93557740cf3482456d80f80a41482542d2ed97243abb8f95b8ee018830693273c535252dfe323b0d470

  • C:\Users\Admin\AppData\Local\Temp\VBC3B1.tmp

    Filesize

    53B

    MD5

    c8593302f6c1b64645dc3da4c6cecff9

    SHA1

    c631220f9573a8af513cd729e42957d0f1f5336d

    SHA256

    9764c8761605cdba5db8e1a6814f84b371c8a92158e9fdcb3565d5c6a04549ed

    SHA512

    aa61a87453067d7b74b999067b40dcf09fb059dc0276a53f5d5938a1e9606bb2c03375ee1489d9efede678ecf262b0fa33ad37c76c60d13b4be9a924f6cb007c

  • memory/2252-98-0x0000000004E50000-0x0000000004F50000-memory.dmp

    Filesize

    1024KB

  • memory/2252-43-0x0000000004E50000-0x0000000004F50000-memory.dmp

    Filesize

    1024KB

  • memory/2252-79-0x0000000004E50000-0x0000000004F50000-memory.dmp

    Filesize

    1024KB

  • memory/2252-70-0x0000000004E50000-0x0000000004F50000-memory.dmp

    Filesize

    1024KB

  • memory/2252-0-0x000000002F3D1000-0x000000002F3D2000-memory.dmp

    Filesize

    4KB

  • memory/2252-2-0x0000000070CCD000-0x0000000070CD8000-memory.dmp

    Filesize

    44KB

  • memory/2252-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2252-118-0x0000000004E50000-0x0000000004F50000-memory.dmp

    Filesize

    1024KB

  • memory/2252-136-0x0000000004E50000-0x0000000004F50000-memory.dmp

    Filesize

    1024KB

  • memory/2252-154-0x0000000004E50000-0x0000000004F50000-memory.dmp

    Filesize

    1024KB

  • memory/2252-173-0x0000000070CCD000-0x0000000070CD8000-memory.dmp

    Filesize

    44KB

  • memory/2252-174-0x0000000004E50000-0x0000000004F50000-memory.dmp

    Filesize

    1024KB