Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    18-05-2024 23:50

General

  • Target

    577eab90797f2804a44cce6241eb9c22_JaffaCakes118.docm

  • Size

    51KB

  • MD5

    577eab90797f2804a44cce6241eb9c22

  • SHA1

    6bee48fb567b6f0acc2cd129741f0351b961c89f

  • SHA256

    14bd8ce373bf64dc8f78775f284ce5449cc350796a4b53c27505c4f9bcba0379

  • SHA512

    e5a5140424c5dcfccd2dafc34bdf2232dd2d046dd933f47053b9278ccf1f67e3a61110da0c81c9f419a42a0a4538c97c5dba1b8a6dba800d0186b69a07d9770c

  • SSDEEP

    1536:91Edx5uQyrwP6mYyv+bUD/iXo6666hjIM9988m4vXTf:9qdx5byUP8mtD/+okhyTf

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_http

C2

http://191.101.42.179:8080/HxJOy7n0CJvydvN3qZ2FLgqSDe-upNDe0J0Ts0S_QVE3U8qmdyykRSnD6T_HvD7La8DNmDu0GFUno6sSH6E1kyH1KFLrK-sU2mx6mwqnG4gBWa7BSH61LeWes6_ip9ijxEIdPAmYbrc9mOjG3ohA4KJrSn_hMCCfI9Pc_7hBhp

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\577eab90797f2804a44cce6241eb9c22_JaffaCakes118.docm"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2828
      • C:\Users\Admin\txqTrPLp.exe
        txqTrPLp.exe
        2⤵
        • Executes dropped EXE
        PID:2684

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      6b772d68dbe87260738f7b3222e348be

      SHA1

      354cc6c09d2cecb5103625647584b58b6144fe6e

      SHA256

      242be567e2224d6e72f584c9fb275a63ed97207ed7e6ccb08763b93e75d43d0d

      SHA512

      ef82501470b1b75c998ea5d2ec5068af960b7f6ed97cef5c3b58d1c224afcd42adf6932980b10d4743993c2a48a7b356e8028aa32c53f740d22bc673415aabea

    • C:\Users\Admin\txqTrPLp.exe
      Filesize

      4KB

      MD5

      4788af93cfbfc6fa40602c34205e8f78

      SHA1

      27846a108f37d617ea2b062673a7cddb62ea1a71

      SHA256

      212f19c7162e353259d30000502c8bc7b938f26398596beaff56dbf2577f8307

      SHA512

      3c70a46284006805ab14d99b834c1192a31ebe4912312e6d4a9b6db5d608d5603c8210e47c5eefc85ebf9d1e648aff53043f0d64d64c66fe58482df9b6d27746

    • memory/2132-48-0x0000000000840000-0x0000000000844000-memory.dmp
      Filesize

      16KB

    • memory/2132-47-0x0000000000840000-0x0000000000844000-memory.dmp
      Filesize

      16KB

    • memory/2132-27-0x0000000005040000-0x0000000005140000-memory.dmp
      Filesize

      1024KB

    • memory/2132-26-0x0000000005040000-0x0000000005140000-memory.dmp
      Filesize

      1024KB

    • memory/2132-2-0x00000000710ED000-0x00000000710F8000-memory.dmp
      Filesize

      44KB

    • memory/2132-80-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2132-0-0x000000002F4B1000-0x000000002F4B2000-memory.dmp
      Filesize

      4KB

    • memory/2132-25-0x0000000005040000-0x0000000005140000-memory.dmp
      Filesize

      1024KB

    • memory/2132-46-0x0000000005040000-0x0000000005140000-memory.dmp
      Filesize

      1024KB

    • memory/2132-52-0x00000000710ED000-0x00000000710F8000-memory.dmp
      Filesize

      44KB

    • memory/2132-54-0x0000000005040000-0x0000000005140000-memory.dmp
      Filesize

      1024KB

    • memory/2132-55-0x0000000000840000-0x0000000000844000-memory.dmp
      Filesize

      16KB

    • memory/2132-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2684-49-0x0000000000400000-0x0000000000404000-memory.dmp
      Filesize

      16KB