Analysis
-
max time kernel
149s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 17:59
Behavioral task
behavioral1
Sample
ebe4eae535d943f9145d9395649b281b_JaffaCakes118.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ebe4eae535d943f9145d9395649b281b_JaffaCakes118.xls
Resource
win10v2004-20240802-en
General
-
Target
ebe4eae535d943f9145d9395649b281b_JaffaCakes118.xls
-
Size
233KB
-
MD5
ebe4eae535d943f9145d9395649b281b
-
SHA1
72b41d1da80745cf5186484f314d3b7c4d942508
-
SHA256
ae77e8a7ff8f741ded073015589f0a0158cb0e30f8b0f112abfa161fc0ee155f
-
SHA512
fe750ae58cd826fb208b7142778ea597764b187857dad8d4c5df236e99cfd10390223269082330f044645745691168d37938b9de3d97aa6c91b2d10808017735
-
SSDEEP
6144:Bk3hOdsylKlgxopeiBNhZF+E+W2kdAzptovbUrXI5xOojZD3jEuXejkdNDQjWDIB:UUrXI5xOsjEuXYkdNDQjWDIWgQq853ry
Malware Config
Signatures
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3828 2384 explorer.exe 81 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4332 2384 explorer.exe 81 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2384 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2384 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2384 EXCEL.EXE 2384 EXCEL.EXE 2384 EXCEL.EXE 2384 EXCEL.EXE 2384 EXCEL.EXE 2384 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2384 wrote to memory of 3828 2384 EXCEL.EXE 85 PID 2384 wrote to memory of 3828 2384 EXCEL.EXE 85 PID 3000 wrote to memory of 3456 3000 explorer.exe 88 PID 3000 wrote to memory of 3456 3000 explorer.exe 88 PID 2384 wrote to memory of 4332 2384 EXCEL.EXE 89 PID 2384 wrote to memory of 4332 2384 EXCEL.EXE 89 PID 216 wrote to memory of 1980 216 explorer.exe 91 PID 216 wrote to memory of 1980 216 explorer.exe 91
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\ebe4eae535d943f9145d9395649b281b_JaffaCakes118.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\explorer.exeexplorer.exe C:\Users\Admin\AppData\Local\Temp\pn7.vbs2⤵
- Process spawned unexpected child process
PID:3828
-
-
C:\Windows\explorer.exeexplorer.exe C:\Users\Admin\AppData\Local\Temp\vrSFYA.vbs2⤵
- Process spawned unexpected child process
PID:4332
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\pn7.vbs"2⤵PID:3456
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\vrSFYA.vbs"2⤵PID:1980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3B
MD521438ef4b9ad4fc266b6129a2f60de29
SHA15eb8e2242eeb4f5432beeec8b873f1ab0a6b71fd
SHA25613bf7b3039c63bf5a50491fa3cfd8eb4e699d1ba1436315aef9cbe5711530354
SHA51237436ced85e5cd638973e716d6713257d692f9dd2e1975d5511ae3856a7b3b9f0d9e497315a058b516ab31d652ea9950938c77c1ad435ea8d4b49d73427d1237
-
Filesize
343B
MD565ee4952b5891c99f5ac3fbec31252bb
SHA18a31b35ef3ea1fa941d5eceed9a761e003e0c5c7
SHA25680d43c53a16323f1fcf4341b81a3be2558b7267af185fde5b9e134fe842ab5c9
SHA5122131f1ba62b8a23c1071a4c621c0f4a5fa2db2ef643eafbb0c4fc5210d4e638e570ecba7aeeefab7089251ec4d29ddcf40532b3c7b67815f292f96892d94fc8c
-
Filesize
783B
MD5e7432dc6b3e8ebfe4d16202fd331f309
SHA1b56ce9651163a08e9f2795e0355a07b7d6d619d0
SHA2561db524dc0c7f7ab984d29052ab6b82edeaf5d0ac9de317f4e0385ba022fd66cb
SHA5120c869c0162e49d63ec3015ea90e4e1904b39fc26d81d09bb0daa21c4d4f242656f5f240bc1610bd2c9f0d7b6f577f69a623694c083124b5d287b1db55a26b327