Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/06/2024, 09:03
Static task
static1
Behavioral task
behavioral1
Sample
198de4a1ebf05f7f44faf76f167b0233_JaffaCakes118.xls
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
198de4a1ebf05f7f44faf76f167b0233_JaffaCakes118.xls
Resource
win10v2004-20240508-en
General
-
Target
198de4a1ebf05f7f44faf76f167b0233_JaffaCakes118.xls
-
Size
235KB
-
MD5
198de4a1ebf05f7f44faf76f167b0233
-
SHA1
4e03e469d9040307bcdd1461f4f242d73ff40d4c
-
SHA256
c34ad3cac4d3b8420fa8dbe1bb0760623ecfa27a6ab7790c231e9e3a92b9039c
-
SHA512
c6f7c0a302375755fcad670ff88d62807c356be1b4a2254a04d2b6e4d9c18c3646360a429838c803dd21575fd289eb4fa2caa6019b8edcf9d7952ab640f4d34e
-
SSDEEP
6144:hl6Nc7yRzs1H75wkZUgsCq6NqTBun5ob8/S7ARnWJ+:lFU+
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1972 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1972 EXCEL.EXE 1972 EXCEL.EXE 1972 EXCEL.EXE 1972 EXCEL.EXE 1972 EXCEL.EXE 1972 EXCEL.EXE 1972 EXCEL.EXE 1972 EXCEL.EXE 1972 EXCEL.EXE 1972 EXCEL.EXE 1972 EXCEL.EXE 1972 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\198de4a1ebf05f7f44faf76f167b0233_JaffaCakes118.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1972