Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2024 21:28
Behavioral task
behavioral1
Sample
ef8cf02b28315daff8ea591bc351976b_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ef8cf02b28315daff8ea591bc351976b_JaffaCakes118.doc
Resource
win10v2004-20240412-en
General
-
Target
ef8cf02b28315daff8ea591bc351976b_JaffaCakes118.doc
-
Size
534KB
-
MD5
ef8cf02b28315daff8ea591bc351976b
-
SHA1
0bc5d06813f9c5aba1369e705dafbc1546c54e4f
-
SHA256
3af1f23c945a8790a256c5cd13bd6f1d29ab5cfa6d40ce88e44aebba33696922
-
SHA512
d62d6671a04ad41b38fece9b86d1517cb876be54ffd367f535ee29d0c2d8bc1c91d8abe3d3af05c01be46bfb73b8f53eadf19f7c4354704a574542649618fe2d
-
SSDEEP
12288:s8CmEKY7gpWMBgroM6scG2u302l0HwbsG7kWunEDXm/zjHwB7:s8CmEj6Bg0MDn2u3049HSn+Xm/s
Malware Config
Extracted
hancitor
1910_nsw
http://newnucapi.com/8/forum.php
http://gintlyba.ru/8/forum.php
http://stralonz.ru/8/forum.php
Signatures
-
Hancitor
Hancitor is downloader used to deliver other malware families.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 3756 2364 rundll32.exe WINWORD.EXE -
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 42 4256 rundll32.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 4256 rundll32.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 41 api.ipify.org -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
NTFS ADS 2 IoCs
Processes:
WINWORD.EXEdescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\{DBDA89C6-C384-4FC9-B592-7F44313FE77F}\gelfor.dap:Zone.Identifier WINWORD.EXE File opened for modification C:\Users\Admin\AppData\Local\Temp\{DBDA89C6-C384-4FC9-B592-7F44313FE77F}\zoro.kl:Zone.Identifier WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 2364 WINWORD.EXE 2364 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
rundll32.exepid process 4256 rundll32.exe 4256 rundll32.exe 4256 rundll32.exe 4256 rundll32.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
Processes:
WINWORD.EXEpid process 2364 WINWORD.EXE 2364 WINWORD.EXE 2364 WINWORD.EXE 2364 WINWORD.EXE 2364 WINWORD.EXE 2364 WINWORD.EXE 2364 WINWORD.EXE 2364 WINWORD.EXE 2364 WINWORD.EXE 2364 WINWORD.EXE 2364 WINWORD.EXE 2364 WINWORD.EXE 2364 WINWORD.EXE 2364 WINWORD.EXE 2364 WINWORD.EXE 2364 WINWORD.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
WINWORD.EXErundll32.exedescription pid process target process PID 2364 wrote to memory of 700 2364 WINWORD.EXE splwow64.exe PID 2364 wrote to memory of 700 2364 WINWORD.EXE splwow64.exe PID 2364 wrote to memory of 3756 2364 WINWORD.EXE rundll32.exe PID 2364 wrote to memory of 3756 2364 WINWORD.EXE rundll32.exe PID 3756 wrote to memory of 4256 3756 rundll32.exe rundll32.exe PID 3756 wrote to memory of 4256 3756 rundll32.exe rundll32.exe PID 3756 wrote to memory of 4256 3756 rundll32.exe rundll32.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ef8cf02b28315daff8ea591bc351976b_JaffaCakes118.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:700
-
-
C:\Windows\SYSTEM32\rundll32.exerundll32.exe c:\users\admin\appdata\roaming\microsoft\templates\gelforr.dap,MVELLJHNDSVBJLD2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe c:\users\admin\appdata\roaming\microsoft\templates\gelforr.dap,MVELLJHNDSVBJLD3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4256
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5bf2393dfe4576945d1f26d3595c5ef9f
SHA1f9abbbcf4bad106e4f5c039082257357f4c28aef
SHA256a1fa622b47a529e1064458aa0decd0c1ebc16efb621511c8cba545036ffeb00e
SHA512bd9972b8310d1357529f62375b883ce3af01c01a56107a0cff93b8cdce43fe7931947ce10790ad5c596392ba8bab842d89e708d4999d87c9c4b858140688fdbf
-
Filesize
4KB
MD5c024f2d9118240e0bfc483b9299dd6cf
SHA1372f04b3efb4cb0a8fc3f82c7918d7478a230f80
SHA256a23c652c83e35c3059746bbdbd71c80e2ac08535d420359cffb6e41df713dc85
SHA512632b48760ca476cd6f01eefa2e6c516f34c822867590419351eefb8c78f6dab6eaf231feff6764d903e09c40eaca14a0b222a961d2ddec951fc8be3cabd3bf04
-
Filesize
262KB
MD551d32ee5bc7ab811041f799652d26e04
SHA1412193006aa3ef19e0a57e16acf86b830993024a
SHA2566230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA5125fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810
-
Filesize
241B
MD5f5310e4d57eb4bfd0514b4070f46def9
SHA169392ae127b33f86e844982957a6d761d5368603
SHA2562c8c3924add47db70a6449b6b493f71f6d045b7cb156bd2112a67724e5fad50c
SHA512489cc600baa5d96584c1f40cc9eac34138543ed1325c7b109523cbd1028a880cddbc6c49ce089c961d157890a50c1761436facf83c46d87cbf21ca1ebbb54726
-
Filesize
341KB
MD5b6487ba7cff8bd5748c8dfa1f7db100c
SHA1a49729ba20a4ad819e890682a88c470b0056a218
SHA256dd891db0c9eed71e1f6e2f659a9b7dc18806626480f36b1e84ef18f41cd6a57d
SHA5128b58aa8b20035b2b4aeeee1ae909bc5245ec0a615990b1f4b9938b8507726931a142e3dde111dc0ca70b3102683305b4e63df91b197136586404e66fcec81f83
-
Filesize
525KB
MD54198ac1dc34de77ab8ceac3c9a25480e
SHA1f8fb1264a292aecb6c2bf5c5d4f3e199e3a822ad
SHA2568ff43b6ddf6243bd5ee073f9987920fa223809f589d151d7e438fd8cc08ce292
SHA51237dd3c50283daa7be1fb831820d273b7663dddce4d98c87c8d08864fac2dc00daf243ca6e50e028d4f04262160f5dea9a98000cffb67d70c07875d3fc2e4c47c