Analysis
-
max time kernel
144s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 07:33
Behavioral task
behavioral1
Sample
ed1d2ec94052a01a82dc41386c67fa95_JaffaCakes118.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ed1d2ec94052a01a82dc41386c67fa95_JaffaCakes118.xls
Resource
win10v2004-20240802-en
General
-
Target
ed1d2ec94052a01a82dc41386c67fa95_JaffaCakes118.xls
-
Size
58KB
-
MD5
ed1d2ec94052a01a82dc41386c67fa95
-
SHA1
26b80c542713e53d2258ea3b271c4c9a3e1e1147
-
SHA256
0c24602274c0afda05197250336fbecd64a2afef887a39f3a714acf727e28c52
-
SHA512
90a3a7eae17f5c0d8d37ffcc408f1790b6e08bda43b51fb0491f35ab03627f9ac6ceb43b6db5ffe8363eccb83f027aecff587a76427889008d3f265e070e330c
-
SSDEEP
1536:Oihz0DewjEXWfCDIM/V5xtezEsi8OUM+tfNaIZEpqpXouv:Oihz0DewjEXWfCDIM/V5xtezEsi8OUMu
Malware Config
Extracted
http://www.psicheaurora.it/fanta/download.php
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2840 2452 rundll32.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2452 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2452 EXCEL.EXE 2452 EXCEL.EXE 2452 EXCEL.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2840 2452 EXCEL.EXE 32 PID 2452 wrote to memory of 2840 2452 EXCEL.EXE 32 PID 2452 wrote to memory of 2840 2452 EXCEL.EXE 32 PID 2452 wrote to memory of 2840 2452 EXCEL.EXE 32 PID 2452 wrote to memory of 2840 2452 EXCEL.EXE 32 PID 2452 wrote to memory of 2840 2452 EXCEL.EXE 32 PID 2452 wrote to memory of 2840 2452 EXCEL.EXE 32
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\ed1d2ec94052a01a82dc41386c67fa95_JaffaCakes118.xls1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\rundll32.exerundll32 ..\Joret.fffooo,DllRegisterServer12⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD526ac240c07fd7989aef333c4ae18234f
SHA1fcff627a9a8ea69a7ce71869c6f776436e4a6cfd
SHA256debb0cdc2ad455bdf2ded4555528d198d7260bd2d7eeadc2523eb485675c5a30
SHA512188f5058de2edd697109d5690acf8b92bb2e0b56d0a7eaa055c57dbcb4cfc1933e19e1c2969ccab0285fcb30075bb26ee95a89846215e3fe1d86a9cee8ee6379