Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2024, 04:16
Behavioral task
behavioral1
Sample
0de03c55577478d9fc235a519f77bc9f_JaffaCakes118.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0de03c55577478d9fc235a519f77bc9f_JaffaCakes118.xlsm
Resource
win10v2004-20240802-en
General
-
Target
0de03c55577478d9fc235a519f77bc9f_JaffaCakes118.xlsm
-
Size
437KB
-
MD5
0de03c55577478d9fc235a519f77bc9f
-
SHA1
17129a7545037e9554afe7538e72ba817ea0d571
-
SHA256
5028b36686a9f8459104051fad79bc01c2500f6dac581ebea117f9eff3430cc8
-
SHA512
854d200e44e8469dd159dd6cb0c3b1e4abf29b3baef08f6639cc6f8de040281cda9e4ff521121fdaf9652b887f67c7b2751abc40b7539f6c9123ccfdc43390e7
-
SSDEEP
12288:FmqfQr0MqXvSVoUMnJo7JegsbrWwQgq9g21iU1:vfRXvSVoUmo7IfWwTkgvQ
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2136 3568 mshta.exe 81 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3568 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 3568 EXCEL.EXE 3568 EXCEL.EXE 3568 EXCEL.EXE 3568 EXCEL.EXE 3568 EXCEL.EXE 3568 EXCEL.EXE 3568 EXCEL.EXE 3568 EXCEL.EXE 3568 EXCEL.EXE 3568 EXCEL.EXE 3568 EXCEL.EXE 3568 EXCEL.EXE 3568 EXCEL.EXE 3568 EXCEL.EXE 3568 EXCEL.EXE 3568 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3568 wrote to memory of 2136 3568 EXCEL.EXE 85 PID 3568 wrote to memory of 2136 3568 EXCEL.EXE 85 PID 2136 wrote to memory of 4068 2136 mshta.exe 87 PID 2136 wrote to memory of 4068 2136 mshta.exe 87
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\0de03c55577478d9fc235a519f77bc9f_JaffaCakes118.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Windows\SYSTEM32\mshta.exemshta C:\ProgramData\getWithinSheet4251.sct2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SYSTEM32\rundll32.exerundll32.exe C:\ProgramData\qTickMarkNone.dll,D2D1CreateFactory3⤵PID:4068
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD538a07a91ddc1df665f848479a76b4da0
SHA193c6f6bff53730e0163cc267bfa3ef10541db1c4
SHA256b36517a0d84d27bf7294b0d9813a319fddefad3e3e178bb7fdfb58866477fb34
SHA512bb08b691e980dde59b665d423f4d08c8ad354ea68d27a397bc64622df6edc9c461fa8d3899c48a00767d02382b8f427a1f9db03e6b0d0b34bd20a89afb3ea7ae
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5c0b9c706728139760ac51e3dd9bbb36a
SHA1dc51972175386f5905e0f794b57c322e6b517b42
SHA25672056a0b64d229b6df33105c47633d2e7671af3a7553c55b6473532a583af8ac
SHA5125e6c6ad284207737e867943d387a56c65e5d7b313a25727cf8590798abf4358a5593f66539e65a02338921f56366164a359b77c7f4db161f22fc9f10d7e7216a