Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-06-2024 08:23

General

  • Target

    0d5d96f6ffb092efcd94cdadfc51c699_JaffaCakes118.xls

  • Size

    416KB

  • MD5

    0d5d96f6ffb092efcd94cdadfc51c699

  • SHA1

    577e1424f00e117aed4a3f15dc1aa3f250d90889

  • SHA256

    761f4012ca8d231529296bc64aeafcaf1617622513beeaa1984eede8c108ae3f

  • SHA512

    cefd3603526671ee88b5bdf6646bb3d58b9d802848c4bdafc9df8f28838d6c760afed9e4cff253ff7ff5a57929f02e8c5268d75d0f85d532213fc06e9085b218

  • SSDEEP

    6144:ag0k7xzZJS+zZJKg0bypiK9eIA25JHo+2lRX+ds7KLm1gjDeJqHezJ4DqtIoVJUI:v5CMRRd

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\0d5d96f6ffb092efcd94cdadfc51c699_JaffaCakes118.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:1628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1628-0-0x00007FFAF4130000-0x00007FFAF4140000-memory.dmp

    Filesize

    64KB

  • memory/1628-2-0x00007FFAF4130000-0x00007FFAF4140000-memory.dmp

    Filesize

    64KB

  • memory/1628-1-0x00007FFAF4130000-0x00007FFAF4140000-memory.dmp

    Filesize

    64KB

  • memory/1628-4-0x00007FFAF4130000-0x00007FFAF4140000-memory.dmp

    Filesize

    64KB

  • memory/1628-6-0x00007FFB340B0000-0x00007FFB342A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1628-7-0x00007FFAF4130000-0x00007FFAF4140000-memory.dmp

    Filesize

    64KB

  • memory/1628-5-0x00007FFB340B0000-0x00007FFB342A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1628-3-0x00007FFB3414D000-0x00007FFB3414E000-memory.dmp

    Filesize

    4KB

  • memory/1628-8-0x00007FFB340B0000-0x00007FFB342A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1628-9-0x00007FFB340B0000-0x00007FFB342A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1628-10-0x00007FFAF17D0000-0x00007FFAF17E0000-memory.dmp

    Filesize

    64KB

  • memory/1628-12-0x00007FFB340B0000-0x00007FFB342A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1628-11-0x00007FFB340B0000-0x00007FFB342A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1628-13-0x00007FFB340B0000-0x00007FFB342A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1628-14-0x00007FFB340B0000-0x00007FFB342A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1628-17-0x00007FFAF17D0000-0x00007FFAF17E0000-memory.dmp

    Filesize

    64KB

  • memory/1628-21-0x00007FFB340B0000-0x00007FFB342A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1628-22-0x00007FFB340B0000-0x00007FFB342A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1628-20-0x00007FFB340B0000-0x00007FFB342A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1628-19-0x00007FFB340B0000-0x00007FFB342A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1628-18-0x00007FFB340B0000-0x00007FFB342A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1628-16-0x00007FFB340B0000-0x00007FFB342A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1628-15-0x00007FFB340B0000-0x00007FFB342A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1628-28-0x00007FFB340B0000-0x00007FFB342A5000-memory.dmp

    Filesize

    2.0MB