Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 19:18
Static task
static1
Behavioral task
behavioral1
Sample
b4c6efe830638972f4e71cdd7d25355b_JaffaCakes118.rtf
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b4c6efe830638972f4e71cdd7d25355b_JaffaCakes118.rtf
Resource
win10v2004-20240611-en
General
-
Target
b4c6efe830638972f4e71cdd7d25355b_JaffaCakes118.rtf
-
Size
717KB
-
MD5
b4c6efe830638972f4e71cdd7d25355b
-
SHA1
151b41c0078c66651306b02879d7aa5a027d0ac6
-
SHA256
9613def893d5be7da45a15cbb94ed1d7c372351522695220ec2804fdbab95562
-
SHA512
6571f41323efd37d27c3ba67f09a75ee31547a344c9cf81ee064c637dd66e2f4cb9e3181bf7d60ec03929566f3ed00cecdb4a98e85da7cae84d6c74fe87ec6bb
-
SSDEEP
12288:moDIPSZVj0KgRCsjoJ6HWCeRRp5agN6Igzp3vv0xDbTvo2bP2OENXDIPSc3:lIPSZVjEpo4c15pNSzFcCnTIPSI
Malware Config
Extracted
formbook
3.8
ch41
109ch.com
mikesguitarclass.com
atelidev.com
hanafiquranacademy.com
bothpartiesmust.win
shelterevents.com
tianshenmaoyi.com
xn--iev583c.com
minijin.net
laka-nosy.com
kireini-biyou.com
gymequipment.click
kena.ltd
taoorders.com
upstairsblogs.com
zubi17.win
direct-mobile.com
bdtimes.info
nyssyf.com
fordnotice.net
masogamedev.com
240606.com
surreyenterprise.com
mailrutraff.com
roughridergoldens.com
inquirerinside.com
rgfahuasi.com
jonbramnickforussenate2018.info
justoneskin.com
cewsh.com
990987.top
bunumualsam.com
k-ush.com
greenwichpointmarketing.info
syhzbxg.com
mademoiselle-annie.com
rhinoplastydoctoristanbul.com
8v0g.cricket
945kfw.info
ouverture.tech
ujoi0cb3td.com
nasenedu.com
xn--pbtw45bkoneio.com
worldfishingmaster.com
beforeoverclock.com
guiltybrothels.info
loveyousweetie.com
ecomonline.biz
54ekcfwp.promo
kkluav59.com
122net.com
550145.top
impactslotstriker.com
035manx.com
catfury.com
klowdlifepromotions.com
gailjessen.com
interiordesignbirmingham.com
ouuhx.info
uecet.com
helloequine.com
honzaj.com
yanzhongxin.com
brazilianton.com
hakilobam.com
Signatures
-
Formbook payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/272-19-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral1/memory/272-23-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral1/memory/272-25-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Executes dropped EXE 2 IoCs
Processes:
exe.exeexe.exepid process 2556 exe.exe 272 exe.exe -
Loads dropped DLL 3 IoCs
Processes:
cmd.exeexe.exepid process 2536 cmd.exe 2536 cmd.exe 2556 exe.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
exe.exeexe.exewlanext.exedescription pid process target process PID 2556 set thread context of 272 2556 exe.exe exe.exe PID 272 set thread context of 1208 272 exe.exe Explorer.EXE PID 272 set thread context of 1208 272 exe.exe Explorer.EXE PID 532 set thread context of 1208 532 wlanext.exe Explorer.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2748 timeout.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 2520 taskkill.exe -
Launches Equation Editor 1 TTPs 2 IoCs
Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.
Processes:
EQNEDT32.EXEEQNEDT32.EXEpid process 2656 EQNEDT32.EXE 2508 EQNEDT32.EXE -
Processes:
WINWORD.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 2176 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
exe.exewlanext.exepid process 272 exe.exe 272 exe.exe 272 exe.exe 532 wlanext.exe 532 wlanext.exe 532 wlanext.exe 532 wlanext.exe 532 wlanext.exe 532 wlanext.exe 532 wlanext.exe 532 wlanext.exe 532 wlanext.exe 532 wlanext.exe 532 wlanext.exe 532 wlanext.exe 532 wlanext.exe 532 wlanext.exe 532 wlanext.exe 532 wlanext.exe 532 wlanext.exe 532 wlanext.exe 532 wlanext.exe 532 wlanext.exe 532 wlanext.exe 532 wlanext.exe 532 wlanext.exe 532 wlanext.exe 532 wlanext.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
exe.exewlanext.exepid process 272 exe.exe 272 exe.exe 272 exe.exe 272 exe.exe 532 wlanext.exe 532 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
taskkill.exeexe.exewlanext.exedescription pid process Token: SeDebugPrivilege 2520 taskkill.exe Token: SeDebugPrivilege 272 exe.exe Token: SeDebugPrivilege 532 wlanext.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
exe.exepid process 2556 exe.exe 2556 exe.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
exe.exepid process 2556 exe.exe 2556 exe.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
WINWORD.EXEexe.exepid process 2176 WINWORD.EXE 2176 WINWORD.EXE 2176 WINWORD.EXE 2176 WINWORD.EXE 2556 exe.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
EQNEDT32.EXECmD.execmd.execmd.exedescription pid process target process PID 2656 wrote to memory of 1268 2656 EQNEDT32.EXE CmD.exe PID 2656 wrote to memory of 1268 2656 EQNEDT32.EXE CmD.exe PID 2656 wrote to memory of 1268 2656 EQNEDT32.EXE CmD.exe PID 2656 wrote to memory of 1268 2656 EQNEDT32.EXE CmD.exe PID 1268 wrote to memory of 2536 1268 CmD.exe cmd.exe PID 1268 wrote to memory of 2536 1268 CmD.exe cmd.exe PID 1268 wrote to memory of 2536 1268 CmD.exe cmd.exe PID 1268 wrote to memory of 2536 1268 CmD.exe cmd.exe PID 2536 wrote to memory of 2748 2536 cmd.exe timeout.exe PID 2536 wrote to memory of 2748 2536 cmd.exe timeout.exe PID 2536 wrote to memory of 2748 2536 cmd.exe timeout.exe PID 2536 wrote to memory of 2748 2536 cmd.exe timeout.exe PID 2536 wrote to memory of 2556 2536 cmd.exe exe.exe PID 2536 wrote to memory of 2556 2536 cmd.exe exe.exe PID 2536 wrote to memory of 2556 2536 cmd.exe exe.exe PID 2536 wrote to memory of 2556 2536 cmd.exe exe.exe PID 2536 wrote to memory of 2520 2536 cmd.exe taskkill.exe PID 2536 wrote to memory of 2520 2536 cmd.exe taskkill.exe PID 2536 wrote to memory of 2520 2536 cmd.exe taskkill.exe PID 2536 wrote to memory of 2520 2536 cmd.exe taskkill.exe PID 2536 wrote to memory of 1508 2536 cmd.exe reg.exe PID 2536 wrote to memory of 1508 2536 cmd.exe reg.exe PID 2536 wrote to memory of 1508 2536 cmd.exe reg.exe PID 2536 wrote to memory of 1508 2536 cmd.exe reg.exe PID 2536 wrote to memory of 340 2536 cmd.exe reg.exe PID 2536 wrote to memory of 340 2536 cmd.exe reg.exe PID 2536 wrote to memory of 340 2536 cmd.exe reg.exe PID 2536 wrote to memory of 340 2536 cmd.exe reg.exe PID 2536 wrote to memory of 1808 2536 cmd.exe reg.exe PID 2536 wrote to memory of 1808 2536 cmd.exe reg.exe PID 2536 wrote to memory of 1808 2536 cmd.exe reg.exe PID 2536 wrote to memory of 1808 2536 cmd.exe reg.exe PID 2536 wrote to memory of 1296 2536 cmd.exe reg.exe PID 2536 wrote to memory of 1296 2536 cmd.exe reg.exe PID 2536 wrote to memory of 1296 2536 cmd.exe reg.exe PID 2536 wrote to memory of 1296 2536 cmd.exe reg.exe PID 2536 wrote to memory of 1912 2536 cmd.exe reg.exe PID 2536 wrote to memory of 1912 2536 cmd.exe reg.exe PID 2536 wrote to memory of 1912 2536 cmd.exe reg.exe PID 2536 wrote to memory of 1912 2536 cmd.exe reg.exe PID 2536 wrote to memory of 2560 2536 cmd.exe reg.exe PID 2536 wrote to memory of 2560 2536 cmd.exe reg.exe PID 2536 wrote to memory of 2560 2536 cmd.exe reg.exe PID 2536 wrote to memory of 2560 2536 cmd.exe reg.exe PID 2536 wrote to memory of 2488 2536 cmd.exe reg.exe PID 2536 wrote to memory of 2488 2536 cmd.exe reg.exe PID 2536 wrote to memory of 2488 2536 cmd.exe reg.exe PID 2536 wrote to memory of 2488 2536 cmd.exe reg.exe PID 2536 wrote to memory of 2568 2536 cmd.exe reg.exe PID 2536 wrote to memory of 2568 2536 cmd.exe reg.exe PID 2536 wrote to memory of 2568 2536 cmd.exe reg.exe PID 2536 wrote to memory of 2568 2536 cmd.exe reg.exe PID 2536 wrote to memory of 2796 2536 cmd.exe cmd.exe PID 2536 wrote to memory of 2796 2536 cmd.exe cmd.exe PID 2536 wrote to memory of 2796 2536 cmd.exe cmd.exe PID 2536 wrote to memory of 2796 2536 cmd.exe cmd.exe PID 2796 wrote to memory of 2800 2796 cmd.exe reg.exe PID 2796 wrote to memory of 2800 2796 cmd.exe reg.exe PID 2796 wrote to memory of 2800 2796 cmd.exe reg.exe PID 2796 wrote to memory of 2800 2796 cmd.exe reg.exe PID 2536 wrote to memory of 2692 2536 cmd.exe cmd.exe PID 2536 wrote to memory of 2692 2536 cmd.exe cmd.exe PID 2536 wrote to memory of 2692 2536 cmd.exe cmd.exe PID 2536 wrote to memory of 2692 2536 cmd.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\b4c6efe830638972f4e71cdd7d25355b_JaffaCakes118.rtf"2⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\exe.exe"3⤵
-
C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding1⤵
- Launches Equation Editor
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\CmD.exeCmD /C %tmp%\task.bat & UUUUUUUU c2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Local\Temp\2nd.bat3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT 14⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\exe.exeC:\Users\Admin\AppData\Local\Temp\ExE.ExE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\exe.exeC:\Users\Admin\AppData\Local\Temp\ExE.ExE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exeTASKKILL /F /IM winword.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\reg.exereg delete HKEY_CURRENT_USER\Software\Microsoft\Office\8.0\Word\Resiliency /f4⤵
-
C:\Windows\SysWOW64\reg.exereg delete HKEY_CURRENT_USER\Software\Microsoft\Office\9.0\Word\Resiliency /f4⤵
-
C:\Windows\SysWOW64\reg.exereg delete HKEY_CURRENT_USER\Software\Microsoft\Office\10.0\Word\Resiliency /f4⤵
-
C:\Windows\SysWOW64\reg.exereg delete HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Word\Resiliency /f4⤵
-
C:\Windows\SysWOW64\reg.exereg delete HKEY_CURRENT_USER\Software\Microsoft\Office\12.0\Word\Resiliency /f4⤵
-
C:\Windows\SysWOW64\reg.exereg delete HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency /f4⤵
-
C:\Windows\SysWOW64\reg.exereg delete HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Word\Resiliency /f4⤵
-
C:\Windows\SysWOW64\reg.exereg delete HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Resiliency /f4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\8.0\Word\File MRU" /v "Item 1"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\8.0\Word\File MRU" /v "Item 1"5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\9.0\Word\File MRU" /v "Item 1"4⤵
-
C:\Windows\SysWOW64\reg.exeREG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\9.0\Word\File MRU" /v "Item 1"5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\10.0\Word\File MRU" /v "Item 1"4⤵
-
C:\Windows\SysWOW64\reg.exeREG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\10.0\Word\File MRU" /v "Item 1"5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\11.0\Word\File MRU" /v "Item 1"4⤵
-
C:\Windows\SysWOW64\reg.exeREG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\11.0\Word\File MRU" /v "Item 1"5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\12.0\Word\File MRU" /v "Item 1"4⤵
-
C:\Windows\SysWOW64\reg.exeREG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\12.0\Word\File MRU" /v "Item 1"5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\14.0\Word\File MRU" /v "Item 1"4⤵
-
C:\Windows\SysWOW64\reg.exeREG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\14.0\Word\File MRU" /v "Item 1"5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Word\File MRU" /v "Item 1"4⤵
-
C:\Windows\SysWOW64\reg.exeREG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Word\File MRU" /v "Item 1"5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Word\File MRU" /v "Item 1"4⤵
-
C:\Windows\SysWOW64\reg.exeREG QUERY "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Word\File MRU" /v "Item 1"5⤵
-
C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding1⤵
- Launches Equation Editor
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\2nd.batFilesize
2KB
MD559183fbaedf0883c681c39dd5ec21ffa
SHA1333f6c6863b70dcf66dbacc677903896f5062cd9
SHA256014a4aca93a93dbfb3c747bf5fb9ec9e6236a5532837730b804eb0d0d3096c8c
SHA51244ee17ab15e370766f40cde472b136f6739c9cbb880be26b8b81794dba37805a1faea995d601cc86e4ac7646f32f6e4a743481b988d9dd59cfd6a6d7424c966b
-
C:\Users\Admin\AppData\Local\Temp\exe.exeFilesize
344KB
MD56085c24a02ee83509c1f31be29e001e6
SHA1555fd639414a04d23b2bcf7485c865691b4964a7
SHA256e39c5055757c8135765bbade87feeeeda684b5b9b405c87e0268be0cf942a902
SHA512a653c3712b0865a9efd8abb1ab93f1eb234e847027e4c139319d18657233312496776c9e8f19d94cbe87541c03ee5e81e65ee2ed75294907f8a5d2dc54edd59d
-
C:\Users\Admin\AppData\Local\Temp\task.batFilesize
154B
MD5c6df97bd319c2e2b887d5de476623737
SHA141a7fdf29b42950b3a076ad46c78b48bb3874140
SHA2568c629d6202f6084f4100920659d623364a4bf01fad652b121148a9a3ff739da0
SHA5125bce66c71d2e2dcdda82fb9b9596a20fa77d06afcc5de82a7ab34b3945c48559301158eff86606200c784a1c84b088684b1aa4443b52bf6069b78b60f48b8524
-
memory/272-23-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/272-19-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/272-25-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/532-27-0x00000000008D0000-0x00000000008E6000-memory.dmpFilesize
88KB
-
memory/1208-22-0x00000000002A0000-0x00000000003A0000-memory.dmpFilesize
1024KB
-
memory/1208-24-0x0000000004D50000-0x0000000004EDC000-memory.dmpFilesize
1.5MB
-
memory/1208-30-0x0000000007190000-0x0000000007274000-memory.dmpFilesize
912KB
-
memory/2176-2-0x00000000710FD000-0x0000000071108000-memory.dmpFilesize
44KB
-
memory/2176-1-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/2176-17-0x00000000710FD000-0x0000000071108000-memory.dmpFilesize
44KB
-
memory/2176-0-0x000000002FB11000-0x000000002FB12000-memory.dmpFilesize
4KB