Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 02:05
Behavioral task
behavioral1
Sample
9cab7cd817d7e40c017508d72919a6af_JaffaCakes118.xls
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9cab7cd817d7e40c017508d72919a6af_JaffaCakes118.xls
Resource
win10v2004-20240508-en
General
-
Target
9cab7cd817d7e40c017508d72919a6af_JaffaCakes118.xls
-
Size
227KB
-
MD5
9cab7cd817d7e40c017508d72919a6af
-
SHA1
2093eb22cbcc280af937cf1b86f26dbe37ff5b3e
-
SHA256
fc2c7c6f30ea17c4fb186e5ef2ad8d32c2019523bcf12502ef9c5e9fadee6c86
-
SHA512
564dd7f08efddf1b5112751fc1f7e32287711c03134b3005113b348cd024a6ba4a8f1592fc5820d453ee2daea13f4632556c36e5a90e77274337809a4ba7cf36
-
SSDEEP
6144:lk3hOdsylKlgxopeiBNhZF+E+W2kdAmzHw5FS8KDZY+k2cbCJPYT:EzQ5FSjVcCQT
Malware Config
Signatures
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2472 2832 explorer.exe 80 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4252 2832 explorer.exe 80 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2832 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2832 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2832 EXCEL.EXE 2832 EXCEL.EXE 2832 EXCEL.EXE 2832 EXCEL.EXE 2832 EXCEL.EXE 2832 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2832 wrote to memory of 2472 2832 EXCEL.EXE 85 PID 2832 wrote to memory of 2472 2832 EXCEL.EXE 85 PID 2848 wrote to memory of 3824 2848 explorer.exe 87 PID 2848 wrote to memory of 3824 2848 explorer.exe 87 PID 2832 wrote to memory of 4252 2832 EXCEL.EXE 88 PID 2832 wrote to memory of 4252 2832 EXCEL.EXE 88 PID 2284 wrote to memory of 2324 2284 explorer.exe 90 PID 2284 wrote to memory of 2324 2284 explorer.exe 90
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\9cab7cd817d7e40c017508d72919a6af_JaffaCakes118.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\explorer.exeexplorer.exe C:\Users\Admin\AppData\Local\Temp\kvAS7vS.vbs2⤵
- Process spawned unexpected child process
PID:2472
-
-
C:\Windows\explorer.exeexplorer.exe C:\Users\Admin\AppData\Local\Temp\qvj.vbs2⤵
- Process spawned unexpected child process
PID:4252
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\kvAS7vS.vbs"2⤵PID:3824
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\qvj.vbs"2⤵PID:2324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3B
MD521438ef4b9ad4fc266b6129a2f60de29
SHA15eb8e2242eeb4f5432beeec8b873f1ab0a6b71fd
SHA25613bf7b3039c63bf5a50491fa3cfd8eb4e699d1ba1436315aef9cbe5711530354
SHA51237436ced85e5cd638973e716d6713257d692f9dd2e1975d5511ae3856a7b3b9f0d9e497315a058b516ab31d652ea9950938c77c1ad435ea8d4b49d73427d1237
-
Filesize
341B
MD5dbae5e5d9e4eb57090f8fe55a8b44aa6
SHA11fca8104bb8f15aff68467c3c87682ecc1d9e2c2
SHA256dde50f3bc51260bde13daa70d2fcbbf745c27a5d18a08e14045fd1afcdeb33ca
SHA512ba2bc3cafb0b20241a2b57a494082fc050199acf62e895df3a32a4c24e769700bf4121b307c4f4f00a5afc8428e91633e5ffb034f8acb14b3612840f4327c24c
-
Filesize
763B
MD54cda00a828a96fc16f3d0c9332fc6af6
SHA1215cf193d402a321fa92ea41bab6bab248de5187
SHA256af51042f8cbebfe7da7457d455868b382d6cbdfc2ebcd08e82b34d9e15c40ef2
SHA5129b791428def5311659d7df0ffbc269646dbcb8546b865423403d6ba3326b15c8cba9e0a5ec84b61ac1a25fb559231f26e0c2a6fbf0af720ef7ff700d3b3b60f1