Analysis
-
max time kernel
107s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/04/2024, 17:46
Behavioral task
behavioral1
Sample
e80de13534ba365f3233d49f317e301a_JaffaCakes118.xlsm
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e80de13534ba365f3233d49f317e301a_JaffaCakes118.xlsm
Resource
win10v2004-20240226-en
General
-
Target
e80de13534ba365f3233d49f317e301a_JaffaCakes118.xlsm
-
Size
435KB
-
MD5
e80de13534ba365f3233d49f317e301a
-
SHA1
42a1c49bf79b1f10db0281fa3c8f87d62d51edfe
-
SHA256
50c394ef02a84f23ef6e066f05e35ab4d94bf208432a609364a1a25dd5f4f85d
-
SHA512
6e8db8453422eee913e610a0996c9bd2c5d060442536260adce42efea60e2ce4167cc89fa66907896252393e64cf248197268aa99a1d4a99271f26128d0a8e6f
-
SSDEEP
12288:FcQfQr0MqXvSVoUMnJo7JegsrFiax7qppF6Ndu:hfRXvSVoUmo7ITupv6Nk
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4612 1828 mshta.exe 83 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1828 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 1828 EXCEL.EXE 1828 EXCEL.EXE 1828 EXCEL.EXE 1828 EXCEL.EXE 1828 EXCEL.EXE 1828 EXCEL.EXE 1828 EXCEL.EXE 1828 EXCEL.EXE 1828 EXCEL.EXE 1828 EXCEL.EXE 1828 EXCEL.EXE 1828 EXCEL.EXE 1828 EXCEL.EXE 1828 EXCEL.EXE 1828 EXCEL.EXE 1828 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1828 wrote to memory of 4612 1828 EXCEL.EXE 89 PID 1828 wrote to memory of 4612 1828 EXCEL.EXE 89 PID 4612 wrote to memory of 400 4612 mshta.exe 90 PID 4612 wrote to memory of 400 4612 mshta.exe 90
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\e80de13534ba365f3233d49f317e301a_JaffaCakes118.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\SYSTEM32\mshta.exemshta C:\ProgramData\getCommand4392.sct2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\SYSTEM32\rundll32.exerundll32.exe C:\ProgramData\qOneAfterAnother.dll,D2D1CreateFactory3⤵PID:400
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD53b714330081537e98de16d84c4e25c9e
SHA1e9bc4297b179b71d66d09ef276d78d2dd5499a6b
SHA2567cdcdc4644a7d34ea51cd168df7e772f945bf7ae38f217e269326e79c2b2ac95
SHA51293b2c4ebd6608239dae2d85ba9673bf18efa86ea2187f430dcd54c2781a5f89c9629957d2e4a65b15b2e6a10cf5e3dcd79be7e1f8d82e6da2d43733ab575c5e8