Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10/04/2024, 12:46

General

  • Target

    eb19c7462467cc020ede16873d751548_JaffaCakes118.xlsm

  • Size

    41KB

  • MD5

    eb19c7462467cc020ede16873d751548

  • SHA1

    68e5cd6210c3bab7bf47794628b00dd8f00fc372

  • SHA256

    53f3b960019ca2ef7792b15b0015aa45e0541cc2e7236bd64c9089ad93f6a94c

  • SHA512

    fa4029e4e5f2b18951c24e6c4c5c39124a936e00ef80e1c412367f021bd8714d385be3aede0fc708a4e34af4155ee29be212622e2f3ac455fdc97df22d08ac50

  • SSDEEP

    768:Q6lbfxXoSCPZxSxDCcDhCfkypA6rwpbRvHxqpXwJTFvH2ynFeWn2Z1fUx:Q6/HaZxSx3MfPsbo6kE2Z1w

Score
1/10

Malware Config

Signatures

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\eb19c7462467cc020ede16873d751548_JaffaCakes118.xlsm
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2196

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2196-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/2196-1-0x00000000727DD000-0x00000000727E8000-memory.dmp

          Filesize

          44KB

        • memory/2196-2-0x00000000727DD000-0x00000000727E8000-memory.dmp

          Filesize

          44KB

        • memory/2196-5-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/2196-6-0x00000000727DD000-0x00000000727E8000-memory.dmp

          Filesize

          44KB