Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-06-2024 02:05

General

  • Target

    9cab7cd817d7e40c017508d72919a6af_JaffaCakes118.xls

  • Size

    227KB

  • MD5

    9cab7cd817d7e40c017508d72919a6af

  • SHA1

    2093eb22cbcc280af937cf1b86f26dbe37ff5b3e

  • SHA256

    fc2c7c6f30ea17c4fb186e5ef2ad8d32c2019523bcf12502ef9c5e9fadee6c86

  • SHA512

    564dd7f08efddf1b5112751fc1f7e32287711c03134b3005113b348cd024a6ba4a8f1592fc5820d453ee2daea13f4632556c36e5a90e77274337809a4ba7cf36

  • SSDEEP

    6144:lk3hOdsylKlgxopeiBNhZF+E+W2kdAmzHw5FS8KDZY+k2cbCJPYT:EzQ5FSjVcCQT

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\9cab7cd817d7e40c017508d72919a6af_JaffaCakes118.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2832
    • C:\Windows\explorer.exe
      explorer.exe C:\Users\Admin\AppData\Local\Temp\kvAS7vS.vbs
      2⤵
      • Process spawned unexpected child process
      PID:2472
    • C:\Windows\explorer.exe
      explorer.exe C:\Users\Admin\AppData\Local\Temp\qvj.vbs
      2⤵
      • Process spawned unexpected child process
      PID:4252
  • C:\Windows\explorer.exe
    C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2848
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\kvAS7vS.vbs"
      2⤵
        PID:3824
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2284
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\qvj.vbs"
        2⤵
          PID:2324

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Mu9OfK.txt

        Filesize

        3B

        MD5

        21438ef4b9ad4fc266b6129a2f60de29

        SHA1

        5eb8e2242eeb4f5432beeec8b873f1ab0a6b71fd

        SHA256

        13bf7b3039c63bf5a50491fa3cfd8eb4e699d1ba1436315aef9cbe5711530354

        SHA512

        37436ced85e5cd638973e716d6713257d692f9dd2e1975d5511ae3856a7b3b9f0d9e497315a058b516ab31d652ea9950938c77c1ad435ea8d4b49d73427d1237

      • C:\Users\Admin\AppData\Local\Temp\kvAS7vS.vbs

        Filesize

        341B

        MD5

        dbae5e5d9e4eb57090f8fe55a8b44aa6

        SHA1

        1fca8104bb8f15aff68467c3c87682ecc1d9e2c2

        SHA256

        dde50f3bc51260bde13daa70d2fcbbf745c27a5d18a08e14045fd1afcdeb33ca

        SHA512

        ba2bc3cafb0b20241a2b57a494082fc050199acf62e895df3a32a4c24e769700bf4121b307c4f4f00a5afc8428e91633e5ffb034f8acb14b3612840f4327c24c

      • C:\Users\Admin\AppData\Local\Temp\qvj.vbs

        Filesize

        763B

        MD5

        4cda00a828a96fc16f3d0c9332fc6af6

        SHA1

        215cf193d402a321fa92ea41bab6bab248de5187

        SHA256

        af51042f8cbebfe7da7457d455868b382d6cbdfc2ebcd08e82b34d9e15c40ef2

        SHA512

        9b791428def5311659d7df0ffbc269646dbcb8546b865423403d6ba3326b15c8cba9e0a5ec84b61ac1a25fb559231f26e0c2a6fbf0af720ef7ff700d3b3b60f1

      • memory/2832-14-0x00007FFAF17D0000-0x00007FFAF17E0000-memory.dmp

        Filesize

        64KB

      • memory/2832-17-0x00007FFAF17D0000-0x00007FFAF17E0000-memory.dmp

        Filesize

        64KB

      • memory/2832-10-0x00007FFB340B0000-0x00007FFB342A5000-memory.dmp

        Filesize

        2.0MB

      • memory/2832-11-0x00007FFB340B0000-0x00007FFB342A5000-memory.dmp

        Filesize

        2.0MB

      • memory/2832-9-0x00007FFB340B0000-0x00007FFB342A5000-memory.dmp

        Filesize

        2.0MB

      • memory/2832-13-0x00007FFB340B0000-0x00007FFB342A5000-memory.dmp

        Filesize

        2.0MB

      • memory/2832-15-0x00007FFB340B0000-0x00007FFB342A5000-memory.dmp

        Filesize

        2.0MB

      • memory/2832-0-0x00007FFAF4130000-0x00007FFAF4140000-memory.dmp

        Filesize

        64KB

      • memory/2832-16-0x00007FFB340B0000-0x00007FFB342A5000-memory.dmp

        Filesize

        2.0MB

      • memory/2832-3-0x00007FFAF4130000-0x00007FFAF4140000-memory.dmp

        Filesize

        64KB

      • memory/2832-18-0x00007FFB340B0000-0x00007FFB342A5000-memory.dmp

        Filesize

        2.0MB

      • memory/2832-12-0x00007FFB340B0000-0x00007FFB342A5000-memory.dmp

        Filesize

        2.0MB

      • memory/2832-8-0x00007FFB340B0000-0x00007FFB342A5000-memory.dmp

        Filesize

        2.0MB

      • memory/2832-7-0x00007FFB340B0000-0x00007FFB342A5000-memory.dmp

        Filesize

        2.0MB

      • memory/2832-6-0x00007FFB340B0000-0x00007FFB342A5000-memory.dmp

        Filesize

        2.0MB

      • memory/2832-5-0x00007FFAF4130000-0x00007FFAF4140000-memory.dmp

        Filesize

        64KB

      • memory/2832-4-0x00007FFB3414D000-0x00007FFB3414E000-memory.dmp

        Filesize

        4KB

      • memory/2832-1-0x00007FFAF4130000-0x00007FFAF4140000-memory.dmp

        Filesize

        64KB

      • memory/2832-2-0x00007FFAF4130000-0x00007FFAF4140000-memory.dmp

        Filesize

        64KB

      • memory/2832-30-0x00007FFB340B0000-0x00007FFB342A5000-memory.dmp

        Filesize

        2.0MB