Analysis
-
max time kernel
149s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
30-04-2024 03:36
Behavioral task
behavioral1
Sample
08ef5a78797711af0272d3c359542c0f_JaffaCakes118.xls
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
08ef5a78797711af0272d3c359542c0f_JaffaCakes118.xls
Resource
win10v2004-20240419-en
General
-
Target
08ef5a78797711af0272d3c359542c0f_JaffaCakes118.xls
-
Size
226KB
-
MD5
08ef5a78797711af0272d3c359542c0f
-
SHA1
28c9a4510f85c7ac448d4eff9e4a52ee52b5df6c
-
SHA256
6d621aff2dbcb6279bc1144dcd581cf0879a03d94a6b2a73dde2e67ffc0e6a0a
-
SHA512
be08ebcedc2c663bc2365bd7f635e627162f976f615bbefea513a87eaad3b5817e3298c8247c8049cca59ebdedfeb1220d8ecbf03541c27809f558aa92eea9d3
-
SSDEEP
6144:1k3hOdsylKlgxopeiBNhZF+E+W2kdAKRfjpozsCYKPcVe9QmkHHkw2iB4OYrjjuf:SKICYKPcVe9QmkHHkw2iB4OYrjjuxwcp
Malware Config
Signatures
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 5036 1468 explorer.exe 83 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4984 1468 explorer.exe 83 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1468 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1468 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1468 EXCEL.EXE 1468 EXCEL.EXE 1468 EXCEL.EXE 1468 EXCEL.EXE 1468 EXCEL.EXE 1468 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1468 wrote to memory of 5036 1468 EXCEL.EXE 88 PID 1468 wrote to memory of 5036 1468 EXCEL.EXE 88 PID 1880 wrote to memory of 4980 1880 explorer.exe 90 PID 1880 wrote to memory of 4980 1880 explorer.exe 90 PID 1468 wrote to memory of 4984 1468 EXCEL.EXE 91 PID 1468 wrote to memory of 4984 1468 EXCEL.EXE 91 PID 892 wrote to memory of 1076 892 explorer.exe 93 PID 892 wrote to memory of 1076 892 explorer.exe 93
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\08ef5a78797711af0272d3c359542c0f_JaffaCakes118.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\explorer.exeexplorer.exe C:\Users\Admin\AppData\Local\Temp\ajIe7F8T.vbs2⤵
- Process spawned unexpected child process
PID:5036
-
-
C:\Windows\explorer.exeexplorer.exe C:\Users\Admin\AppData\Local\Temp\ZXU.vbs2⤵
- Process spawned unexpected child process
PID:4984
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ajIe7F8T.vbs"2⤵PID:4980
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ZXU.vbs"2⤵PID:1076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3B
MD521438ef4b9ad4fc266b6129a2f60de29
SHA15eb8e2242eeb4f5432beeec8b873f1ab0a6b71fd
SHA25613bf7b3039c63bf5a50491fa3cfd8eb4e699d1ba1436315aef9cbe5711530354
SHA51237436ced85e5cd638973e716d6713257d692f9dd2e1975d5511ae3856a7b3b9f0d9e497315a058b516ab31d652ea9950938c77c1ad435ea8d4b49d73427d1237
-
Filesize
756B
MD552863279b5ac116bd4d6831940137045
SHA1649c4b00d206f69f51f97eb9f783665e344a7983
SHA25668e6546cec5e56a419594dc96485d6be2b25606605a5f6ea021f0e152e8c55c2
SHA512284c36ee59204d6c72c73908483d6f06582aa4fef99cc9bd0a088f06a3f3b487f1315984792f55a2c505ee135fd2b4477551fc8d0a3d0c6dfe925579abc82c64
-
Filesize
333B
MD5927e81e45aa15f86c265deebab99fa59
SHA129b905c53bb6453f8fda6e4f7e152281419bf6a1
SHA25630958752af4d2517aaf560584427bf0753e37c752b4249532fb4cb6156361fae
SHA512197e666b1fe9211a9b9b28157253b27f30c1f0b6d832ad24896bbefc2cccb4c26f8c6e45349f5cda5d51a75a96351be96832b83e17e16df67347bb5ccb395250