Analysis
-
max time kernel
150s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09-08-2024 21:48
Behavioral task
behavioral1
Sample
83ac39d1741a697ad63598818fefb58b_JaffaCakes118.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
83ac39d1741a697ad63598818fefb58b_JaffaCakes118.xls
Resource
win10v2004-20240802-en
General
-
Target
83ac39d1741a697ad63598818fefb58b_JaffaCakes118.xls
-
Size
145KB
-
MD5
83ac39d1741a697ad63598818fefb58b
-
SHA1
364a1f71eaafefe89860d7a9c6773297a0d50e5f
-
SHA256
5b424584f92912bcce18e13782e8f25e042a258e6af080a7e26d578ddd713e7b
-
SHA512
89b36406442a3c2b231fcfce21605ef5796c7cd3b2353dda7a37a858d0b8439762a1ac243ab5c907ddd0f333c70418f59ddfe58ba358d1a8b37eb4cb4d433f5a
-
SSDEEP
3072:0k3hOdsylKlgxopeiBNhZFGzE+cL2kdA+MGBcK/YNgNlFpKNul/CQrDHlAw:0k3hOdsylKlgxopeiBNhZF+E+W2kdA+N
Malware Config
Signatures
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2852 1732 explorer.exe 28 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2856 1732 explorer.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1732 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1732 EXCEL.EXE 1732 EXCEL.EXE 1732 EXCEL.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2852 1732 EXCEL.EXE 29 PID 1732 wrote to memory of 2852 1732 EXCEL.EXE 29 PID 1732 wrote to memory of 2852 1732 EXCEL.EXE 29 PID 1732 wrote to memory of 2852 1732 EXCEL.EXE 29 PID 3056 wrote to memory of 2896 3056 explorer.exe 31 PID 3056 wrote to memory of 2896 3056 explorer.exe 31 PID 3056 wrote to memory of 2896 3056 explorer.exe 31 PID 1732 wrote to memory of 2856 1732 EXCEL.EXE 32 PID 1732 wrote to memory of 2856 1732 EXCEL.EXE 32 PID 1732 wrote to memory of 2856 1732 EXCEL.EXE 32 PID 1732 wrote to memory of 2856 1732 EXCEL.EXE 32 PID 2660 wrote to memory of 2676 2660 explorer.exe 34 PID 2660 wrote to memory of 2676 2660 explorer.exe 34 PID 2660 wrote to memory of 2676 2660 explorer.exe 34
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\83ac39d1741a697ad63598818fefb58b_JaffaCakes118.xls1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe C:\Users\Admin\AppData\Local\Temp\yWR.vbs2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:2852
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe C:\Users\Admin\AppData\Local\Temp\nMf2C.vbs2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:2856
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\yWR.vbs"2⤵PID:2896
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\nMf2C.vbs"2⤵PID:2676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3B
MD521438ef4b9ad4fc266b6129a2f60de29
SHA15eb8e2242eeb4f5432beeec8b873f1ab0a6b71fd
SHA25613bf7b3039c63bf5a50491fa3cfd8eb4e699d1ba1436315aef9cbe5711530354
SHA51237436ced85e5cd638973e716d6713257d692f9dd2e1975d5511ae3856a7b3b9f0d9e497315a058b516ab31d652ea9950938c77c1ad435ea8d4b49d73427d1237
-
Filesize
715B
MD5da71f8b98e9e16c8b88879ac95cc1102
SHA11dad6ce4e938cac5f18ce7e14e900145fdef448b
SHA2560cc82c39157d500466a4ed30c76bb20e0dbbd470730d3674120a20e75f64558d
SHA512c680567f5ee9e476ffed46e6efe5ee61d513320d3baa7ddd3eebc4f20cb69536ca73946668ed447984bbfc2bf4ebfa4f0ca1a886ab92ed9e6c6e5812e4ca6161
-
Filesize
322B
MD552ab7ee6ada4437a21e45f1fe8cb13b9
SHA1940292957a902a7c6012a4e7c85b8929fc11a9e3
SHA2566a9e478fbf578aff4b9806066b4cb79f9d0c009f9a9216eb43edbdbf8d85519f
SHA512a509c0c04f61c20a42575f47c35ba55e90217e45df0ed85c151e3693a10d9971550e50f0e8525786bd6a691e2a557ff3d7fa9a7a8cc2dbd6a2c840180c6cdc12