Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
1511d9415c19949baaf7da4958f28659_JaffaCakes118.xls
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
1511d9415c19949baaf7da4958f28659_JaffaCakes118.xls
Resource
win10v2004-20240802-en
General
-
Target
1511d9415c19949baaf7da4958f28659_JaffaCakes118.xls
-
Size
113KB
-
MD5
1511d9415c19949baaf7da4958f28659
-
SHA1
5fcc84ea2605f699e788bfdbe9bead2ece250567
-
SHA256
98fde5b0f49d9b64bed201e1a00feda4db7f3683bdb04a73ba5bf0bcd78ed8ae
-
SHA512
93f57181a1c6043f4a454603e457b45cba92363703ad3ec9a5f269697512834d8ce9343c44997ce0b1aaf735fc6f3e2783cd995de24e577f3bcc41986b27ed80
-
SSDEEP
3072:RNPOOZ5SZ+NvFjtWVbrzQ7ITkfpUwzJtXw9vSM1:PPSsNvlvg
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3684 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 3684 EXCEL.EXE 3684 EXCEL.EXE 3684 EXCEL.EXE 3684 EXCEL.EXE 3684 EXCEL.EXE 3684 EXCEL.EXE 3684 EXCEL.EXE 3684 EXCEL.EXE 3684 EXCEL.EXE 3684 EXCEL.EXE 3684 EXCEL.EXE 3684 EXCEL.EXE 3684 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\1511d9415c19949baaf7da4958f28659_JaffaCakes118.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD53f00c1faed0fb6fe7392c9f2c2022f9f
SHA1060505cba8d88b117ba6a64cbfef78a7d3a093ff
SHA256e2f4b464805063202fb7492da675507ff8a4a7332598e63aadc854ab3006ea02
SHA51278c7e0090ec318a530d92de185c3bba9b2695736b0d5c4c22b35542485e0ee197354d4e1fc573ca2e45de336edd71a40e8da982e3d83c5c078e5491c0416d37e