Analysis
-
max time kernel
133s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2024 14:42
Static task
static1
Behavioral task
behavioral1
Sample
3067d881eb56115f8ff1200a328645be_JaffaCakes118.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3067d881eb56115f8ff1200a328645be_JaffaCakes118.xls
Resource
win10v2004-20241007-en
General
-
Target
3067d881eb56115f8ff1200a328645be_JaffaCakes118.xls
-
Size
24KB
-
MD5
3067d881eb56115f8ff1200a328645be
-
SHA1
1025a9c6ab029d401ad643513f78bafd26145c22
-
SHA256
4637494b847ad3706fa12a547033c7b204d9e2dcc8bd27c084550cf4a1a55f05
-
SHA512
b3464e324228edf106dd62c1fc085a6fbf8054946e1decf3810624678f1ce3cc1485376545421071dce0caa939f7d0aa72f9537dd0c4c5e99f9c86f196088ae8
-
SSDEEP
768:pyJJJAdFX/615hTVR2ANxCyG6GSlM2zr:oJJJAdFX/615hT9PCuJzr
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3164 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 18 IoCs
pid Process 3164 EXCEL.EXE 3164 EXCEL.EXE 3164 EXCEL.EXE 3164 EXCEL.EXE 3164 EXCEL.EXE 3164 EXCEL.EXE 3164 EXCEL.EXE 3164 EXCEL.EXE 3164 EXCEL.EXE 3164 EXCEL.EXE 3164 EXCEL.EXE 3164 EXCEL.EXE 3164 EXCEL.EXE 3164 EXCEL.EXE 3164 EXCEL.EXE 3164 EXCEL.EXE 3164 EXCEL.EXE 3164 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\3067d881eb56115f8ff1200a328645be_JaffaCakes118.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3164
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f1b5d31534bce7d254c5003028001797
SHA1577cf0f83d02a664fe4449a7a62395579afbbcf6
SHA256e6a229d514a3aa019ed5f879ca1c27969d09c636d3d703469abe1e71562a732b
SHA5122ae8cfdf87939d562c83d5490a68891297102f4178d510e5d00a64d5afc19ca53326d11e5cd01da581fc6559f1b26e674eb5368c79b45bb9e9d426f62ddb67dc
-
Filesize
8KB
MD5116530eba459f505fa48fc8e585365c5
SHA1584e98a31e74025e8996eda91dbf7b25148fff40
SHA2561ad9ca2cbf5edf2099b13264acc1885b1a3d604a512b0180a97927b311a32063
SHA512158e4540ea029a407bf56c7562eb1a3b0197fc447e7c339e08ac319a5b99d8e0230f9b66a06e481936912999807c1111e7c9944b27ab1c7e2414729051526ead
-
Filesize
8KB
MD5247c87f3f9373810e7147d88a1618c8f
SHA1a80f929912fafb9f26e6816d531baba26bd970d4
SHA2569d38a81158d60a8503afec068656111664f27d574f24f9a2a98e523ead233bff
SHA512f99303ef79fdfb189542e6548594b19bc623cd541497a7a10597b521016acdab338d244f013f9263566eb69e79cb39f4592a671d026bea8cb2f79b2c7a1e205b
-
Filesize
330B
MD561e5c901a2a94dc6bbfcad3e16e14e4c
SHA1aa8c968cef546110f59d02ed82de447a82ed40c6
SHA256871c487a5d8c255b53728e73601b0f53cbda9310b9ed76f86f8148bf40c38099
SHA512c7de35357e88097c27316f988a2106d472db6adedfc80d38de7865739bed284af7de6753d81fa173d19851de736b00ce563e14021f9c427f7dc5079b2724beeb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize683B
MD582427ba5ee365bf6254d0d672b2ec985
SHA14a2f0443d88f1bae28f3a18e38a7bb294070b509
SHA256c704b1294ebeeb143e5d9a18c1521a14fe5ed4dd50f01ea4592df80d2d31926d
SHA512304bb47f640a83128b2dee15119455f5ab3d1c485ec93cbf05982560ea5220768a48326256c943f645862d8ac77057957f28ece5dbfcab6ed86fe95f8d5ced73