Overview
overview
7Static
static
310343bf892...18.exe
windows7-x64
710343bf892...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3AxsUtils.dll
windows7-x64
1AxsUtils.dll
windows10-2004-x64
1CheckForUpdates.dll
windows7-x64
1CheckForUpdates.dll
windows10-2004-x64
1Interop.eW...ol.dll
windows7-x64
1Interop.eW...ol.dll
windows10-2004-x64
1LLCryptoLib.dll
windows7-x64
1LLCryptoLib.dll
windows10-2004-x64
1LiteActivate.dll
windows7-x64
1LiteActivate.dll
windows10-2004-x64
1LiteErrorReport.dll
windows7-x64
1LiteErrorReport.dll
windows10-2004-x64
1LiteSerializer.dll
windows7-x64
1LiteSerializer.dll
windows10-2004-x64
1Microsoft....el.dll
windows7-x64
1Microsoft....el.dll
windows10-2004-x64
1Microsoft....op.dll
windows7-x64
1Microsoft....op.dll
windows10-2004-x64
1NCryptXL.exe
windows7-x64
1NCryptXL.exe
windows10-2004-x64
1data/examp...le.xls
windows7-x64
1data/examp...le.xls
windows10-2004-x64
1data/examp...s.xlsx
windows7-x64
1data/examp...s.xlsx
windows10-2004-x64
1Analysis
-
max time kernel
100s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26/06/2024, 01:09
Static task
static1
Behavioral task
behavioral1
Sample
10343bf892632ec266a3cc135e68a848_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
10343bf892632ec266a3cc135e68a848_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240419-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
AxsUtils.dll
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
AxsUtils.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
CheckForUpdates.dll
Resource
win7-20240611-en
Behavioral task
behavioral12
Sample
CheckForUpdates.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
Interop.eWebControl.dll
Resource
win7-20240611-en
Behavioral task
behavioral14
Sample
Interop.eWebControl.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
LLCryptoLib.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
LLCryptoLib.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
LiteActivate.dll
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
LiteActivate.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral19
Sample
LiteErrorReport.dll
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
LiteErrorReport.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
LiteSerializer.dll
Resource
win7-20240419-en
Behavioral task
behavioral22
Sample
LiteSerializer.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
Microsoft.Office.Interop.Excel.dll
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
Microsoft.Office.Interop.Excel.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
Microsoft.Vbe.Interop.dll
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
Microsoft.Vbe.Interop.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
NCryptXL.exe
Resource
win7-20231129-en
Behavioral task
behavioral28
Sample
NCryptXL.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
data/examples/Example.xls
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
data/examples/Example.xls
Resource
win10v2004-20240611-en
Behavioral task
behavioral31
Sample
data/examples/RandomPasswords.xlsx
Resource
win7-20240611-en
Behavioral task
behavioral32
Sample
data/examples/RandomPasswords.xlsx
Resource
win10v2004-20240508-en
General
-
Target
data/examples/RandomPasswords.xlsx
-
Size
31KB
-
MD5
1b83128c32c1fa621a6fe8abb8a7f671
-
SHA1
5c1eb26d5e49bb3262354f869615dd3fd4464208
-
SHA256
3915013da2ba2d9a96d7eb9637b47f97ce98074cb35500f0411e69a20cd88235
-
SHA512
a053b294d8c6bb92bd938d351cb795480d80ac1b77e8a9e0a3d39ebc33378d99012135743badb6486d014defa579a72804edc025874b62506f371f7cdb091f8d
-
SSDEEP
768:mjScXBZsdCXSWhgJ6pjG04NY2ppJEhQPwgf:mOo/k8ShqjG04NVECr
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3944 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3944 EXCEL.EXE 3944 EXCEL.EXE 3944 EXCEL.EXE 3944 EXCEL.EXE 3944 EXCEL.EXE 3944 EXCEL.EXE 3944 EXCEL.EXE 3944 EXCEL.EXE 3944 EXCEL.EXE 3944 EXCEL.EXE 3944 EXCEL.EXE 3944 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\data\examples\RandomPasswords.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3944