Analysis

  • max time kernel
    127s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    31/05/2024, 12:29

General

  • Target

    8702385f0a64bf1aa8e202430692a9e6_JaffaCakes118.rtf

  • Size

    3.3MB

  • MD5

    8702385f0a64bf1aa8e202430692a9e6

  • SHA1

    758541f9d90a87b9f97bbc6c2c7d65e9d4ebf1cf

  • SHA256

    59b4702cd0c51c54e7872bd2d0db8015102f555d8a55779e6a9a08f42ae38c08

  • SHA512

    9ff0553cccacb98269478df8ef65506da64b10ab5b16830f3c03f3c2f0796a5b6ca769154ba0f5e92dc16167586834737fcedf75355f2c5cea3c54535542844f

  • SSDEEP

    24576:XVXHwimMpe3zZ9If2qHTS+qloJVtJZapoTPmeh+LIxE4Cg2MZfkhTJ73Wd:t

Score
10/10

Malware Config

Signatures

  • Donot APT Downloader

    A downloader used by Donot APT group to download further modules.

  • Blocklisted process makes network request 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\8702385f0a64bf1aa8e202430692a9e6_JaffaCakes118.rtf"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1688
  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" -Embedding
    1⤵
    • Loads dropped DLL
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2304
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2636
    • C:\Program Files (x86)\Microsoft Office\Office14\excelcnv.exe
      "C:\Program Files (x86)\Microsoft Office\Office14\excelcnv.exe" -Embedding
      1⤵
      • Enumerates system info in registry
      PID:2584
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {A5FCB765-2806-45AB-8735-9822ED8AB01D} S-1-5-21-268080393-3149932598-1824759070-1000:UHRQKJCP\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:348
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe "C:\Users\Admin\AppData\Roaming\logical\mentn.dll", flis
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:816
        • C:\Windows\SysWOW64\rundll32.exe
          C:\Windows\System32\rundll32.exe "C:\Users\Admin\AppData\Roaming\logical\mentn.dll", flis
          3⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          PID:916

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FA0E937D.emf

      Filesize

      4KB

      MD5

      3a21a2578df3f021866f175d612663af

      SHA1

      6444d55a4e930bb752e7764e900c02f76a7a9918

      SHA256

      1bad79e6948b476f3cdbe4004548c44b64dfd0505edf172e58e0fa8d8e48f985

      SHA512

      53cac32004f481c4b5a3cba9b7c2aac4cf3cdc035aabbc9a8560a38b26f622158aeadcd53f32c7f2521a673e3b3dfda8abb1d9eca46b4e59bbce212dfce66331

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      4a4553a8f9ba3778820394c97cae4735

      SHA1

      833f4fa00b241255e280502b560f44f85013bbb0

      SHA256

      e32e905b55341d90a7c2e7e28406dc705e615594fec06e676ee6cd7be723b419

      SHA512

      4122619fa5903d59a5a41e0dbb4f784a9f5e8bc85fa20ade3c8fdda568495954ffb2b69e9be0015d8768da4830f21f25c9332a6cc0f559602187a3c709a2f302

    • C:\Users\Admin\AppData\Roaming\logical\mentn.dll

      Filesize

      465KB

      MD5

      1cff79823c44b2dda5d22dd04941fca5

      SHA1

      890de66006a750781080720b2a80e4faf6b3c8c6

      SHA256

      e987cc75c8fd578ccc5a7b517d05b0e3d14e04334cc5a0def69be1b495caeda7

      SHA512

      12aec3a69661730d6ea90e3cecdf9e918703e26eb0766d5b04ea36bd3349e4de06901804c3921bc268fc2aabcb70dcf8acf7e4e8f1c9cc695ebfcbb5bdf51e09

    • \Users\Admin\AppData\Local\Temp\written.dll

      Filesize

      350KB

      MD5

      d3b52426cd79ac1352dc540407764a43

      SHA1

      594efa6be778966ad172a3c07cbd8a2db365220f

      SHA256

      8cfbfecfe475c3621277ee7f680e3a0cb9c650802363daa256c1057adfb817a9

      SHA512

      a5323521a08f30313647444ddca4985d73b91c05a55445ca82dacebed8e6353d5bb09e36d0084c04ee6bb3559ce2f671df814c27962dea5416aa0eff433a6bf9

    • memory/1688-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1688-2-0x0000000070FCD000-0x0000000070FD8000-memory.dmp

      Filesize

      44KB

    • memory/1688-0-0x000000002F4F1000-0x000000002F4F2000-memory.dmp

      Filesize

      4KB

    • memory/1688-76-0x0000000070FCD000-0x0000000070FD8000-memory.dmp

      Filesize

      44KB

    • memory/2304-8-0x0000000070FCD000-0x0000000070FD8000-memory.dmp

      Filesize

      44KB

    • memory/2304-29-0x00000000065B0000-0x00000000066B0000-memory.dmp

      Filesize

      1024KB

    • memory/2304-67-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2304-72-0x0000000070FCD000-0x0000000070FD8000-memory.dmp

      Filesize

      44KB

    • memory/2304-28-0x00000000065B0000-0x00000000066B0000-memory.dmp

      Filesize

      1024KB

    • memory/2304-24-0x0000000000450000-0x0000000000550000-memory.dmp

      Filesize

      1024KB

    • memory/2304-25-0x00000000065B0000-0x00000000066B0000-memory.dmp

      Filesize

      1024KB