Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/04/2024, 15:43
Static task
static1
Behavioral task
behavioral1
Sample
d7df191d102bd307bc586acc6dfae307_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d7df191d102bd307bc586acc6dfae307_JaffaCakes118.doc
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
decrypted.xlsx
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
decrypted.xlsx
Resource
win10v2004-20240226-en
General
-
Target
decrypted.xlsx
-
Size
524KB
-
MD5
f2437015948f03c215f6b31e5b1b51f8
-
SHA1
99a0a7560aa1e068d40ad740af080d8a31d850b7
-
SHA256
6bc97eb0d1ba9b245fec8b12b827f1cc4cbe883be79cfef7b50a7ffc678606f6
-
SHA512
ce4bd8c6aaa8e0efcbc7e8c207f2b16966fab0db9d94ebe408214fe06e60625723aac66e5590ede1fc70a9ba907863b82f33ff0a5416c0db5135fc95a79e1c3a
-
SSDEEP
12288:nHApxqbRsHUya+0NCqwbRXbFgdlOenxDzhdrM1yDZX9FX:HAzqq0ya++CnbFElOe93rR9FX
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1584 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1584 EXCEL.EXE 1584 EXCEL.EXE 1584 EXCEL.EXE 1584 EXCEL.EXE 1584 EXCEL.EXE 1584 EXCEL.EXE 1584 EXCEL.EXE 1584 EXCEL.EXE 1584 EXCEL.EXE 1584 EXCEL.EXE 1584 EXCEL.EXE 1584 EXCEL.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\decrypted.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1584