Analysis
-
max time kernel
66s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2024, 19:10
Behavioral task
behavioral1
Sample
fd7075efa74442ec550ba1b0613f0db3_JaffaCakes118.xlsm
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fd7075efa74442ec550ba1b0613f0db3_JaffaCakes118.xlsm
Resource
win10v2004-20240226-en
General
-
Target
fd7075efa74442ec550ba1b0613f0db3_JaffaCakes118.xlsm
-
Size
252KB
-
MD5
fd7075efa74442ec550ba1b0613f0db3
-
SHA1
cc34b9d08b301523a1ee0f1cce90fd3a9f9c4c6b
-
SHA256
56c2a6cd514956d83ac3d9f810ca1d942ba929f29a9af1d37aee3a1ce54a0283
-
SHA512
0b919291d04e060277248566241aca01689859f6d3c9953b61dbf01ad6b55dbbc193d1c594d3ed3f3e61f51dbae1f1adc2d6b0ab820b7941a76aab3a1bda54cd
-
SSDEEP
6144:SWtZbAPPimNA/kjoitk17d3/zIZgddQIMgB0ViWir2Yv6ZtK2BnBkxXpsw:3tZbAPDNAcM5d3bFLKW0ir2YvoU2BnBS
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 456 2640 MSHTA.exe 90 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2640 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2640 EXCEL.EXE 2640 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2640 EXCEL.EXE 2640 EXCEL.EXE 2640 EXCEL.EXE 2640 EXCEL.EXE 2640 EXCEL.EXE 2640 EXCEL.EXE 2640 EXCEL.EXE 2640 EXCEL.EXE 2640 EXCEL.EXE 2640 EXCEL.EXE 2640 EXCEL.EXE 2640 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\fd7075efa74442ec550ba1b0613f0db3_JaffaCakes118.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2640 -
C:\Windows\SYSTEM32\MSHTA.exeMSHTA C:\ProgramData\OyIGHoID.sct2⤵
- Process spawned unexpected child process
PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1424 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:81⤵PID:3228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26KB
MD5a7a70027c73d0df1be59bfa69fbc33c5
SHA130b3c70053fefb38dd4118ad83d5b93931d2fd3f
SHA2565284d2c2382e406e7baed841d063f41f7653124bd923e0397523eb1195d02932
SHA512c340fea56c396cecf0ded3769d5f575ffd50719baeb1c716acb678d32cfba07609f8cf3d68bcc857393ac476c0fb5424609d0cfe6f87a7aeeb2ba6f478abd317