Analysis

  • max time kernel
    149s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 06:39

General

  • Target

    eac6ae245c86058f6b8eef8651de7f06_JaffaCakes118.xls

  • Size

    110KB

  • MD5

    eac6ae245c86058f6b8eef8651de7f06

  • SHA1

    8e6fb839a827129f4126aa922d39fcd0ac8d6269

  • SHA256

    8661b70a05067d692aae8cc62162d4a2363d219729cd05574b85356bb52af1f0

  • SHA512

    3eef62cfd760438cbc49ae42ea8078c4e0f7864fc6390ee9d26ab040220b084c8fe7a5401d8696b119efca440ee63233e5fabf6304bed49df992a47e9a30f631

  • SSDEEP

    3072:9/7uDphYHceXVhca+fMHLtyeGxcl8/dgj6YsFmDJEFB6cn4p55wY5pcz8hd:57uDphYHceXVhca+fMHLty/xcl8/dgiu

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://bartstoppel.com/rqfardzsgihu/555555555.png

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\eac6ae245c86058f6b8eef8651de7f06_JaffaCakes118.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    2KB

    MD5

    cb612b54f6029ea8cf0e9001873327ee

    SHA1

    4aa08a5da0665857a051d9058ac78af68381a3ce

    SHA256

    7f9928decad7f46aee1f856033289f3c838e96233d3e8c6014ebfdce93ce26df

    SHA512

    7311a4fc2740e9670c04740f9bae4bde2db7aad6b47330e3e19b8ac215961ee94c98f6aca7c3596ca137eba948f564a934c09e1eb36157f82fbc2764f37da57b

  • memory/2588-14-0x00007FFFD7170000-0x00007FFFD7365000-memory.dmp

    Filesize

    2.0MB

  • memory/2588-35-0x00007FFFD7170000-0x00007FFFD7365000-memory.dmp

    Filesize

    2.0MB

  • memory/2588-2-0x00007FFF971F0000-0x00007FFF97200000-memory.dmp

    Filesize

    64KB

  • memory/2588-5-0x00007FFF971F0000-0x00007FFF97200000-memory.dmp

    Filesize

    64KB

  • memory/2588-4-0x00007FFF971F0000-0x00007FFF97200000-memory.dmp

    Filesize

    64KB

  • memory/2588-10-0x00007FFFD7170000-0x00007FFFD7365000-memory.dmp

    Filesize

    2.0MB

  • memory/2588-11-0x00007FFFD7170000-0x00007FFFD7365000-memory.dmp

    Filesize

    2.0MB

  • memory/2588-9-0x00007FFFD7170000-0x00007FFFD7365000-memory.dmp

    Filesize

    2.0MB

  • memory/2588-8-0x00007FFFD7170000-0x00007FFFD7365000-memory.dmp

    Filesize

    2.0MB

  • memory/2588-12-0x00007FFF94AB0000-0x00007FFF94AC0000-memory.dmp

    Filesize

    64KB

  • memory/2588-0-0x00007FFFD720D000-0x00007FFFD720E000-memory.dmp

    Filesize

    4KB

  • memory/2588-3-0x00007FFF971F0000-0x00007FFF97200000-memory.dmp

    Filesize

    64KB

  • memory/2588-19-0x00007FFFD7170000-0x00007FFFD7365000-memory.dmp

    Filesize

    2.0MB

  • memory/2588-18-0x00007FFFD7170000-0x00007FFFD7365000-memory.dmp

    Filesize

    2.0MB

  • memory/2588-13-0x00007FFFD7170000-0x00007FFFD7365000-memory.dmp

    Filesize

    2.0MB

  • memory/2588-17-0x00007FFFD7170000-0x00007FFFD7365000-memory.dmp

    Filesize

    2.0MB

  • memory/2588-16-0x00007FFFD7170000-0x00007FFFD7365000-memory.dmp

    Filesize

    2.0MB

  • memory/2588-15-0x00007FFF94AB0000-0x00007FFF94AC0000-memory.dmp

    Filesize

    64KB

  • memory/2588-6-0x00007FFFD7170000-0x00007FFFD7365000-memory.dmp

    Filesize

    2.0MB

  • memory/2588-33-0x00007FFFD7170000-0x00007FFFD7365000-memory.dmp

    Filesize

    2.0MB

  • memory/2588-34-0x00007FFFD720D000-0x00007FFFD720E000-memory.dmp

    Filesize

    4KB

  • memory/2588-1-0x00007FFF971F0000-0x00007FFF97200000-memory.dmp

    Filesize

    64KB

  • memory/2588-36-0x00007FFFD7170000-0x00007FFFD7365000-memory.dmp

    Filesize

    2.0MB

  • memory/2588-7-0x00007FFFD7170000-0x00007FFFD7365000-memory.dmp

    Filesize

    2.0MB