Analysis
-
max time kernel
131s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 19:39
Behavioral task
behavioral1
Sample
e9d808a162fe28e7c64e0acfe71b911d_JaffaCakes118.docm
Resource
win7-20240704-en
General
-
Target
e9d808a162fe28e7c64e0acfe71b911d_JaffaCakes118.docm
-
Size
654KB
-
MD5
e9d808a162fe28e7c64e0acfe71b911d
-
SHA1
2b8dffacd54196e882bc29bfd1dace121b619dd7
-
SHA256
473254189c42ed4d695ab7d15131b6a5b70f300de93ee34028364feecf51850c
-
SHA512
2aa641f1f4c27d0b220a3f49e69a4b07f11c4c0cb5e0b05ef2279cfdaf9186b6a8f42c73cfaa410572620874d2ffa63acbe0f87a43c4f86c7480fa4a2d2ca9a1
-
SSDEEP
12288:aCldyxIA+zISba/LbjM8xFrztlSvnSucVM2V0aa3E0hfPr9dCeV:BxdbcbTxFrKnSucOpVV
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
explorer.exedescription pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE is not expected to spawn this process 1528 2948 explorer.exe 27 -
Processes:
resource yara_rule behavioral1/memory/264-55-0x00000000006B0000-0x00000000006E8000-memory.dmp templ_dll behavioral1/memory/264-59-0x0000000001F10000-0x0000000001F46000-memory.dmp templ_dll -
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid Process 264 regsvr32.exe -
Drops file in Windows directory 1 IoCs
Processes:
WINWORD.EXEdescription ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
regsvr32.exeWINWORD.EXEexplorer.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid Process 2948 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
wermgr.exedescription pid Process Token: SeDebugPrivilege 620 wermgr.exe Token: SeDebugPrivilege 620 wermgr.exe Token: SeDebugPrivilege 620 wermgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid Process 2948 WINWORD.EXE 2948 WINWORD.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
WINWORD.EXEexplorer.exeWScript.exeregsvr32.exeregsvr32.exedescription pid Process procid_target PID 2948 wrote to memory of 1528 2948 WINWORD.EXE 28 PID 2948 wrote to memory of 1528 2948 WINWORD.EXE 28 PID 2948 wrote to memory of 1528 2948 WINWORD.EXE 28 PID 2948 wrote to memory of 1528 2948 WINWORD.EXE 28 PID 2212 wrote to memory of 2632 2212 explorer.exe 31 PID 2212 wrote to memory of 2632 2212 explorer.exe 31 PID 2212 wrote to memory of 2632 2212 explorer.exe 31 PID 2948 wrote to memory of 2704 2948 WINWORD.EXE 32 PID 2948 wrote to memory of 2704 2948 WINWORD.EXE 32 PID 2948 wrote to memory of 2704 2948 WINWORD.EXE 32 PID 2948 wrote to memory of 2704 2948 WINWORD.EXE 32 PID 2632 wrote to memory of 808 2632 WScript.exe 36 PID 2632 wrote to memory of 808 2632 WScript.exe 36 PID 2632 wrote to memory of 808 2632 WScript.exe 36 PID 2632 wrote to memory of 808 2632 WScript.exe 36 PID 2632 wrote to memory of 808 2632 WScript.exe 36 PID 808 wrote to memory of 264 808 regsvr32.exe 37 PID 808 wrote to memory of 264 808 regsvr32.exe 37 PID 808 wrote to memory of 264 808 regsvr32.exe 37 PID 808 wrote to memory of 264 808 regsvr32.exe 37 PID 808 wrote to memory of 264 808 regsvr32.exe 37 PID 808 wrote to memory of 264 808 regsvr32.exe 37 PID 808 wrote to memory of 264 808 regsvr32.exe 37 PID 264 wrote to memory of 620 264 regsvr32.exe 38 PID 264 wrote to memory of 620 264 regsvr32.exe 38 PID 264 wrote to memory of 620 264 regsvr32.exe 38 PID 264 wrote to memory of 620 264 regsvr32.exe 38 PID 264 wrote to memory of 620 264 regsvr32.exe 38 PID 264 wrote to memory of 620 264 regsvr32.exe 38
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\e9d808a162fe28e7c64e0acfe71b911d_JaffaCakes118.docm"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\explorer.exeexplorer c:\programdata\objStreamUTF8NoBOM.Vbe2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:1528
-
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2704
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\objStreamUTF8NoBOM.Vbe"2⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" c:\UTF8NoBOM\APSLVDFB.dll3⤵
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\SysWOW64\regsvr32.exec:\UTF8NoBOM\APSLVDFB.dll4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe5⤵
- Suspicious use of AdjustPrivilegeToken
PID:620
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
576KB
MD5376038e75a8172b752fd5a8c8b348136
SHA1abd2bc47505d39978bcf5260d5ceff36b7be257a
SHA256e680577626870fb45df77f29860518d904e175c91c045fdd3b9472f762a4073b
SHA51235706189f1b373eb5ea0dccf48a80d576455d1799b1e738f2127baffdb1c79792de2b9160ca7953a68b79f34e528ad26bcb6dd16e74940c446aa5c518a2c2c26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d57b4444aef076736b13618fe305b32
SHA15c5f4599053e994628db5b48ab4867dc63099a90
SHA2567751055a2684279efc7ff4a9b6b6687413c026d11d193515817b28330bc5a3a6
SHA512a258d6486b20ef67c0ca053289fb55f842f861f548f99f47d73bbf03d6bdda91ddf7c17c34dd0e0a441116251010827b0eebb9d6bef3aabfafdf23d07cbba7a3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{4F8E1FAB-B505-4681-B7E6-2780010B88FC}.tmp
Filesize1.4MB
MD55dbedbbca7b7c344de6eced11d6399f3
SHA171cb690d9797440e7d8a1423cc4822d811feb148
SHA25611c5680df718441a98cf798211cec005c247160f750f8c819371db85a1512801
SHA5124a2270c87c0c616155a9ab351dc3f7a0494d992ccca13044ce39ca249fa0a2e3c14461791f25c649d1a718ef1e7aa0fe3a6293391d7820bafd3c7a2d2e65a19a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{7BD52FFE-EDBD-4960-8D5E-C693A4B5BBF8}.tmp
Filesize1024B
MD57160764d34e82b51f2e1ac85a72c5431
SHA1ef72dad0043f0052ce3122ad0e86233b7ad19fee
SHA256fda0079558ec250289bed8ff1440391b5ff4f3c6bca7eca292849dd98f880acf
SHA512361fb1ee403b8d5f70b78e7d5d075be8d4acd287d84f1459abdeec257f34276b676a7eaaa819ec5bc61926a1f976349cad55c7d964d773300920793cc2e1c1a3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
20KB
MD5975e99183578ed901fcb4b165c9578a1
SHA12d9c95e863eab340cff3fd4815f445b8ed929ba7
SHA25628c7f14ac5802b494a05e64d742f619ab54c8bc8c1b86e9c5946a679804b7f04
SHA512330afd91df9a664afa7bbe021b9358c40e654055a0c2f77a63a05a46602eea861a6b470442b3e003783d1bb42364e5651d452949179386c095fd63d6e9e06f18
-
Filesize
304KB
MD5234efc055e93b433e41d555fb37736e1
SHA1b9973c6a5fda7c1a8f50afa1e822346e2ce39dc7
SHA2567fee0f3adb6bb5a3ed22ad960709a87893e2512d099f6c8c39946097d9a4122b
SHA5120ead597e2702815c71e1c1a0d222e91d83301034cdad4c1109fab39370bde922748827f6e38cf9dbbd7d318615c73c0598b980b82df9267dee1c5721f9e7f1a4