Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16/06/2024, 01:01
Behavioral task
behavioral1
Sample
b1058c3dd17e067dc54e0cad3fbbcacc_JaffaCakes118.xlsm
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b1058c3dd17e067dc54e0cad3fbbcacc_JaffaCakes118.xlsm
Resource
win10v2004-20240508-en
General
-
Target
b1058c3dd17e067dc54e0cad3fbbcacc_JaffaCakes118.xlsm
-
Size
1.5MB
-
MD5
b1058c3dd17e067dc54e0cad3fbbcacc
-
SHA1
59715d15e96a43cf40064a460614543dd3249ba7
-
SHA256
4654417a909b537f634c74374eb9d8601a9ceee2af8481fe46c341fa21c1fdc8
-
SHA512
c741795572fb09ecea356ba0c9e44c478d2b6c9d6647937360f2df442f9e2ab9fc0e771a6a560b65ffc0de6c3e30d69d2ff2e157d3cb614cda3cfe4e46df7445
-
SSDEEP
24576:G1BXbw3Qi3t0yBnbcf9keDokCknpeyaN1fu2AqhniM/ZFDjc3b7az1Dg3v0nO3Mq:ubw3Qi9bdcfOLk0NNl8MhyPazxgcnO3R
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 628 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 628 EXCEL.EXE 628 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 628 EXCEL.EXE 628 EXCEL.EXE 628 EXCEL.EXE 628 EXCEL.EXE 628 EXCEL.EXE 628 EXCEL.EXE 628 EXCEL.EXE 628 EXCEL.EXE 628 EXCEL.EXE 628 EXCEL.EXE 628 EXCEL.EXE 628 EXCEL.EXE 628 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 628 wrote to memory of 3484 628 EXCEL.EXE 86 PID 628 wrote to memory of 3484 628 EXCEL.EXE 86
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\b1058c3dd17e067dc54e0cad3fbbcacc_JaffaCakes118.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:3484
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:3280