Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/07/2024, 01:19

General

  • Target

    5e7b24bfd0d43f8ad1d9e06f5d2e663a_JaffaCakes118.xls

  • Size

    52KB

  • MD5

    5e7b24bfd0d43f8ad1d9e06f5d2e663a

  • SHA1

    653308a9f8040d83d34cd5491f99b6377be7c0cb

  • SHA256

    6e5ecbcec5a538fa5e7218fa818f5282b7e8c8466b619d9f48b6a58cb20f31b5

  • SHA512

    fe640cc46f57d5b80bc0f4ee8261269bbfe1da7657fcacf0e720ad7f7d83eefbb8e8dd2751abe20c846ae7dc30e0baf779780540f620d2b74031cf3639e2a832

  • SSDEEP

    1536:Sihz0DewjEXWfCDIM/V5xtezEsi8OUM+mfz+dZy0/kouI:Sihz0DewjEXWfCDIM/V5xtezEsi8OUM6

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://parosdiving.com/catsdeal/color.php

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\5e7b24bfd0d43f8ad1d9e06f5d2e663a_JaffaCakes118.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3884
    • C:\Windows\SYSTEM32\rundll32.exe
      rundll32 ..\Herti.dosterage,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      PID:4880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    2KB

    MD5

    9924e58113b135fa5cd3b94384d86bcc

    SHA1

    531817ececf642c244b3b9171248a98d1484aa62

    SHA256

    d6908e336b269b3c86d77a4006b3fcccbe1df1d7a2950bea62b599715fd20595

    SHA512

    b46b461614352008879c5564d2769b76fddba00962e68e35df8e5fcbc3f096a6e3fb09ccb87c8ddd72120988e6a55b21f365fd232d17e05730f895cfaa289483

  • memory/3884-16-0x00007FFB5CBF0000-0x00007FFB5CDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3884-10-0x00007FFB5CBF0000-0x00007FFB5CDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3884-3-0x00007FFB5CC8D000-0x00007FFB5CC8E000-memory.dmp

    Filesize

    4KB

  • memory/3884-4-0x00007FFB1CC70000-0x00007FFB1CC80000-memory.dmp

    Filesize

    64KB

  • memory/3884-7-0x00007FFB5CBF0000-0x00007FFB5CDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3884-9-0x00007FFB5CBF0000-0x00007FFB5CDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3884-12-0x00007FFB5CBF0000-0x00007FFB5CDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3884-17-0x00007FFB1A420000-0x00007FFB1A430000-memory.dmp

    Filesize

    64KB

  • memory/3884-0-0x00007FFB1CC70000-0x00007FFB1CC80000-memory.dmp

    Filesize

    64KB

  • memory/3884-13-0x00007FFB1A420000-0x00007FFB1A430000-memory.dmp

    Filesize

    64KB

  • memory/3884-1-0x00007FFB1CC70000-0x00007FFB1CC80000-memory.dmp

    Filesize

    64KB

  • memory/3884-15-0x00007FFB5CBF0000-0x00007FFB5CDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3884-11-0x00007FFB5CBF0000-0x00007FFB5CDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3884-19-0x00007FFB5CBF0000-0x00007FFB5CDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3884-18-0x00007FFB5CBF0000-0x00007FFB5CDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3884-14-0x00007FFB5CBF0000-0x00007FFB5CDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3884-8-0x00007FFB5CBF0000-0x00007FFB5CDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3884-6-0x00007FFB5CBF0000-0x00007FFB5CDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3884-5-0x00007FFB1CC70000-0x00007FFB1CC80000-memory.dmp

    Filesize

    64KB

  • memory/3884-21-0x00007FFB5CBF0000-0x00007FFB5CDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3884-20-0x00007FFB5CBF0000-0x00007FFB5CDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3884-2-0x00007FFB1CC70000-0x00007FFB1CC80000-memory.dmp

    Filesize

    64KB

  • memory/3884-42-0x00007FFB5CBF0000-0x00007FFB5CDE5000-memory.dmp

    Filesize

    2.0MB