Analysis

  • max time kernel
    152s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-04-2024 04:16

General

  • Target

    f73ec376263276b164b92ae8404ba38f_JaffaCakes118.xls

  • Size

    36KB

  • MD5

    f73ec376263276b164b92ae8404ba38f

  • SHA1

    c14fbe5b7678ddf296c7a87ec9bab9129727e402

  • SHA256

    a3f7c1ea0e397c481df890aba490e6292ef3b0eed82bfa8cf0f26fe1c1f43eed

  • SHA512

    47b1cfb680459ed92cfbab7f1d0a22e4fc91bea54e0173395cebcb447c2ee345f6863b668ed21df6a33018f7adf8ef1bb79d058cb5396fdec7ad76a44b4273cb

  • SSDEEP

    768:0PqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJQPozxTBz8Mq3kd1I24/z3XQ:wok3hbdlylKsgqopeJBWhZFGkE+cL2NO

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 2 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\f73ec376263276b164b92ae8404ba38f_JaffaCakes118.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Windows\explorer.exe
      explorer.exe C:\Users\Public\Documents\Rh8.vbs
      2⤵
      • Process spawned unexpected child process
      PID:4204
  • C:\Windows\explorer.exe
    C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2468
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Public\Documents\Rh8.vbs"
      2⤵
      • Blocklisted process makes network request
      PID:2112

Network

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Public\Documents\Rh8.vbs
    Filesize

    562B

    MD5

    2cda72119598d9ba783fa93720026095

    SHA1

    b7ef4a97815d999e0a05ad88f1a29a38011cf960

    SHA256

    1f511367ff1a867132eba65720ff74f079adeaeeac9c0d6ba4b0d78840cebe79

    SHA512

    477cb2ef2d1b779e1f8f4151fad630a422f3bb1258511c3afce6d7752ec126a1d64ae8b77656176753977111748ec34f390a91c7752bb0839f57c2a5c52ed96a

  • memory/1964-19-0x00007FF89C410000-0x00007FF89C605000-memory.dmp
    Filesize

    2.0MB

  • memory/1964-11-0x00007FF85A250000-0x00007FF85A260000-memory.dmp
    Filesize

    64KB

  • memory/1964-20-0x00007FF89C410000-0x00007FF89C605000-memory.dmp
    Filesize

    2.0MB

  • memory/1964-9-0x00007FF89C410000-0x00007FF89C605000-memory.dmp
    Filesize

    2.0MB

  • memory/1964-21-0x00007FF89C410000-0x00007FF89C605000-memory.dmp
    Filesize

    2.0MB

  • memory/1964-13-0x00007FF89C410000-0x00007FF89C605000-memory.dmp
    Filesize

    2.0MB

  • memory/1964-12-0x00007FF89C410000-0x00007FF89C605000-memory.dmp
    Filesize

    2.0MB

  • memory/1964-22-0x00007FF89C410000-0x00007FF89C605000-memory.dmp
    Filesize

    2.0MB

  • memory/1964-14-0x00007FF89C410000-0x00007FF89C605000-memory.dmp
    Filesize

    2.0MB

  • memory/1964-15-0x00007FF89C410000-0x00007FF89C605000-memory.dmp
    Filesize

    2.0MB

  • memory/1964-18-0x00007FF89C410000-0x00007FF89C605000-memory.dmp
    Filesize

    2.0MB

  • memory/1964-2-0x00007FF85C490000-0x00007FF85C4A0000-memory.dmp
    Filesize

    64KB

  • memory/1964-5-0x00007FF89C410000-0x00007FF89C605000-memory.dmp
    Filesize

    2.0MB

  • memory/1964-6-0x00007FF89C410000-0x00007FF89C605000-memory.dmp
    Filesize

    2.0MB

  • memory/1964-10-0x00007FF89C410000-0x00007FF89C605000-memory.dmp
    Filesize

    2.0MB

  • memory/1964-23-0x00007FF89C410000-0x00007FF89C605000-memory.dmp
    Filesize

    2.0MB

  • memory/1964-17-0x00007FF85A250000-0x00007FF85A260000-memory.dmp
    Filesize

    64KB

  • memory/1964-16-0x00007FF89C410000-0x00007FF89C605000-memory.dmp
    Filesize

    2.0MB

  • memory/1964-8-0x00007FF89C410000-0x00007FF89C605000-memory.dmp
    Filesize

    2.0MB

  • memory/1964-7-0x00007FF89C410000-0x00007FF89C605000-memory.dmp
    Filesize

    2.0MB

  • memory/1964-4-0x00007FF85C490000-0x00007FF85C4A0000-memory.dmp
    Filesize

    64KB

  • memory/1964-1-0x00007FF85C490000-0x00007FF85C4A0000-memory.dmp
    Filesize

    64KB

  • memory/1964-0-0x00007FF85C490000-0x00007FF85C4A0000-memory.dmp
    Filesize

    64KB

  • memory/1964-3-0x00007FF85C490000-0x00007FF85C4A0000-memory.dmp
    Filesize

    64KB

  • memory/1964-35-0x00007FF89C410000-0x00007FF89C605000-memory.dmp
    Filesize

    2.0MB