Analysis
-
max time kernel
95s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 06:24
Behavioral task
behavioral1
Sample
f564011c2aaf582fc5e7e9c95d5b6b44_JaffaCakes118.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f564011c2aaf582fc5e7e9c95d5b6b44_JaffaCakes118.xls
Resource
win10v2004-20240802-en
General
-
Target
f564011c2aaf582fc5e7e9c95d5b6b44_JaffaCakes118.xls
-
Size
49KB
-
MD5
f564011c2aaf582fc5e7e9c95d5b6b44
-
SHA1
65d02f58a19d9e2a5fd7f3e8906ae0c1cb0e1dfe
-
SHA256
83016b48397789f5215cffc5c1cc223846736ce2d795fb14bc1f3f7b87af0fa1
-
SHA512
e9ef93ab63b8d1f3710e04513ce6bdfefd186f616d65d67e9d94a8b30b924a6c6c4dd1ba0f9e2cb57e65b52400cab071002f6387348195bfa7e23fb9a06ca013
-
SSDEEP
1536:YTvX/7uDphYHceXVhca+fMHLtyeGxcl8/dgeD6yzsF6BCKG6GJ+QP:G/7uDphYHceXVhca+fMHLtyeGxcl8/do
Malware Config
Extracted
http://matterandhome.com/twtao/222222.png
Signatures
-
Process spawned suspicious child process 1 IoCs
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2668 3224 DW20.EXE 81 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dwwin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dwwin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dwwin.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dwwin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwwin.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3224 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3224 EXCEL.EXE 3224 EXCEL.EXE 3224 EXCEL.EXE 3224 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3224 EXCEL.EXE 3224 EXCEL.EXE 3224 EXCEL.EXE 3224 EXCEL.EXE 3224 EXCEL.EXE 3224 EXCEL.EXE 3224 EXCEL.EXE 3224 EXCEL.EXE 3224 EXCEL.EXE 3224 EXCEL.EXE 3224 EXCEL.EXE 3224 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3224 wrote to memory of 2668 3224 EXCEL.EXE 84 PID 3224 wrote to memory of 2668 3224 EXCEL.EXE 84 PID 2668 wrote to memory of 2904 2668 DW20.EXE 86 PID 2668 wrote to memory of 2904 2668 DW20.EXE 86
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\f564011c2aaf582fc5e7e9c95d5b6b44_JaffaCakes118.xls"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE" -x -s 45602⤵
- Process spawned suspicious child process
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\system32\dwwin.exeC:\Windows\system32\dwwin.exe -x -s 45603⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:2904
-
-