Analysis

  • max time kernel
    136s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-08-2024 01:16

General

  • Target

    b9cb5b440d5d408e27c4685f50c5aa17_JaffaCakes118.xls

  • Size

    258KB

  • MD5

    b9cb5b440d5d408e27c4685f50c5aa17

  • SHA1

    19a2a767171cb7c6609f150e8c86456fa2bba9ec

  • SHA256

    e3462d258f0247f1db6b618620f570208c9fafbfdf79aa51358ad140a4adbf84

  • SHA512

    472db388bebf745cc30f41196a81c2b6a93f6845ec6b07170515cff8d81a2e6007639bcf725b29698f96033738961b4ba70abf395fcf9c2d0dc57e0daf4edd3a

  • SSDEEP

    6144:Jk3hbdlylKsgqopeJBWhZFVE+W2NdANWIIrepCVs1jrRex1CbDR1exbn:0jepC0jFevaRspn

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://ochko123.net/xls_c.php

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\b9cb5b440d5d408e27c4685f50c5aa17_JaffaCakes118.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4212
    • C:\Windows\System32\rundll32.exe
      "C:\Windows\System32\rundll32.exe" C:\VumitLa\vjsQLoq\iJUOgdz.dll,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      PID:1844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    e9b79546cdc58286ac0d91f8653113fc

    SHA1

    5bc64f571113459bb787f03f1bdef027d77a7a49

    SHA256

    7a023fa7145fcb689a7eef79aa5c05414d8043fc6b5641181e5126a0d5f8e8d9

    SHA512

    c96e3fbb27d0d022d3a83769b7c355ea8e77d43510b323bc1f89272ba6dd3c4d9ee04d9ff9b502893096f613f5961daaca7297a59178cd34a633374ec2edfde3

  • memory/4212-8-0x00007FFB20B80000-0x00007FFB20B90000-memory.dmp

    Filesize

    64KB

  • memory/4212-7-0x00007FFB63070000-0x00007FFB63265000-memory.dmp

    Filesize

    2.0MB

  • memory/4212-5-0x00007FFB230F0000-0x00007FFB23100000-memory.dmp

    Filesize

    64KB

  • memory/4212-3-0x00007FFB6310D000-0x00007FFB6310E000-memory.dmp

    Filesize

    4KB

  • memory/4212-9-0x00007FFB20B80000-0x00007FFB20B90000-memory.dmp

    Filesize

    64KB

  • memory/4212-6-0x00007FFB63070000-0x00007FFB63265000-memory.dmp

    Filesize

    2.0MB

  • memory/4212-4-0x00007FFB230F0000-0x00007FFB23100000-memory.dmp

    Filesize

    64KB

  • memory/4212-1-0x00007FFB230F0000-0x00007FFB23100000-memory.dmp

    Filesize

    64KB

  • memory/4212-0-0x00007FFB230F0000-0x00007FFB23100000-memory.dmp

    Filesize

    64KB

  • memory/4212-19-0x00007FFB63070000-0x00007FFB63265000-memory.dmp

    Filesize

    2.0MB

  • memory/4212-2-0x00007FFB230F0000-0x00007FFB23100000-memory.dmp

    Filesize

    64KB

  • memory/4212-44-0x00007FFB230F0000-0x00007FFB23100000-memory.dmp

    Filesize

    64KB

  • memory/4212-43-0x00007FFB230F0000-0x00007FFB23100000-memory.dmp

    Filesize

    64KB

  • memory/4212-46-0x00007FFB230F0000-0x00007FFB23100000-memory.dmp

    Filesize

    64KB

  • memory/4212-45-0x00007FFB230F0000-0x00007FFB23100000-memory.dmp

    Filesize

    64KB

  • memory/4212-47-0x00007FFB63070000-0x00007FFB63265000-memory.dmp

    Filesize

    2.0MB