Analysis

  • max time kernel
    149s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-04-2024 03:36

General

  • Target

    08ef5a78797711af0272d3c359542c0f_JaffaCakes118.xls

  • Size

    226KB

  • MD5

    08ef5a78797711af0272d3c359542c0f

  • SHA1

    28c9a4510f85c7ac448d4eff9e4a52ee52b5df6c

  • SHA256

    6d621aff2dbcb6279bc1144dcd581cf0879a03d94a6b2a73dde2e67ffc0e6a0a

  • SHA512

    be08ebcedc2c663bc2365bd7f635e627162f976f615bbefea513a87eaad3b5817e3298c8247c8049cca59ebdedfeb1220d8ecbf03541c27809f558aa92eea9d3

  • SSDEEP

    6144:1k3hOdsylKlgxopeiBNhZF+E+W2kdAKRfjpozsCYKPcVe9QmkHHkw2iB4OYrjjuf:SKICYKPcVe9QmkHHkw2iB4OYrjjuxwcp

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\08ef5a78797711af0272d3c359542c0f_JaffaCakes118.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1468
    • C:\Windows\explorer.exe
      explorer.exe C:\Users\Admin\AppData\Local\Temp\ajIe7F8T.vbs
      2⤵
      • Process spawned unexpected child process
      PID:5036
    • C:\Windows\explorer.exe
      explorer.exe C:\Users\Admin\AppData\Local\Temp\ZXU.vbs
      2⤵
      • Process spawned unexpected child process
      PID:4984
  • C:\Windows\explorer.exe
    C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1880
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ajIe7F8T.vbs"
      2⤵
        PID:4980
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:892
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ZXU.vbs"
        2⤵
          PID:1076

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\NJ23eWZ.txt

        Filesize

        3B

        MD5

        21438ef4b9ad4fc266b6129a2f60de29

        SHA1

        5eb8e2242eeb4f5432beeec8b873f1ab0a6b71fd

        SHA256

        13bf7b3039c63bf5a50491fa3cfd8eb4e699d1ba1436315aef9cbe5711530354

        SHA512

        37436ced85e5cd638973e716d6713257d692f9dd2e1975d5511ae3856a7b3b9f0d9e497315a058b516ab31d652ea9950938c77c1ad435ea8d4b49d73427d1237

      • C:\Users\Admin\AppData\Local\Temp\ZXU.vbs

        Filesize

        756B

        MD5

        52863279b5ac116bd4d6831940137045

        SHA1

        649c4b00d206f69f51f97eb9f783665e344a7983

        SHA256

        68e6546cec5e56a419594dc96485d6be2b25606605a5f6ea021f0e152e8c55c2

        SHA512

        284c36ee59204d6c72c73908483d6f06582aa4fef99cc9bd0a088f06a3f3b487f1315984792f55a2c505ee135fd2b4477551fc8d0a3d0c6dfe925579abc82c64

      • C:\Users\Admin\AppData\Local\Temp\ajIe7F8T.vbs

        Filesize

        333B

        MD5

        927e81e45aa15f86c265deebab99fa59

        SHA1

        29b905c53bb6453f8fda6e4f7e152281419bf6a1

        SHA256

        30958752af4d2517aaf560584427bf0753e37c752b4249532fb4cb6156361fae

        SHA512

        197e666b1fe9211a9b9b28157253b27f30c1f0b6d832ad24896bbefc2cccb4c26f8c6e45349f5cda5d51a75a96351be96832b83e17e16df67347bb5ccb395250

      • memory/1468-9-0x00007FFCB3C50000-0x00007FFCB3E45000-memory.dmp

        Filesize

        2.0MB

      • memory/1468-11-0x00007FFCB3C50000-0x00007FFCB3E45000-memory.dmp

        Filesize

        2.0MB

      • memory/1468-5-0x00007FFCB3C50000-0x00007FFCB3E45000-memory.dmp

        Filesize

        2.0MB

      • memory/1468-8-0x00007FFCB3C50000-0x00007FFCB3E45000-memory.dmp

        Filesize

        2.0MB

      • memory/1468-6-0x00007FFCB3C50000-0x00007FFCB3E45000-memory.dmp

        Filesize

        2.0MB

      • memory/1468-0-0x00007FFC73CD0000-0x00007FFC73CE0000-memory.dmp

        Filesize

        64KB

      • memory/1468-7-0x00007FFCB3C50000-0x00007FFCB3E45000-memory.dmp

        Filesize

        2.0MB

      • memory/1468-4-0x00007FFC73CD0000-0x00007FFC73CE0000-memory.dmp

        Filesize

        64KB

      • memory/1468-10-0x00007FFCB3C50000-0x00007FFCB3E45000-memory.dmp

        Filesize

        2.0MB

      • memory/1468-12-0x00007FFC71370000-0x00007FFC71380000-memory.dmp

        Filesize

        64KB

      • memory/1468-13-0x00007FFC71370000-0x00007FFC71380000-memory.dmp

        Filesize

        64KB

      • memory/1468-3-0x00007FFC73CD0000-0x00007FFC73CE0000-memory.dmp

        Filesize

        64KB

      • memory/1468-2-0x00007FFC73CD0000-0x00007FFC73CE0000-memory.dmp

        Filesize

        64KB

      • memory/1468-1-0x00007FFC73CD0000-0x00007FFC73CE0000-memory.dmp

        Filesize

        64KB

      • memory/1468-25-0x00007FFCB3C50000-0x00007FFCB3E45000-memory.dmp

        Filesize

        2.0MB