Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/12/2024, 23:23
Behavioral task
behavioral1
Sample
dbfd362f93939ba71ec688ca908954c9_JaffaCakes118.xls
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
dbfd362f93939ba71ec688ca908954c9_JaffaCakes118.xls
Resource
win10v2004-20241007-en
General
-
Target
dbfd362f93939ba71ec688ca908954c9_JaffaCakes118.xls
-
Size
42KB
-
MD5
dbfd362f93939ba71ec688ca908954c9
-
SHA1
451b84c7eae7edb0b4cdaf559874dd2f69519bea
-
SHA256
742b3c34f55d85d809e8f60fbca9188ba1989a35419e1cebabebd8fbfe4f106f
-
SHA512
963277fd9acf9cdb708446748d606f77cc8f29778a1e2c7f5d832ef3e75040a84453f65553dad17768318ef82dfbd4f1634d0c1ab594c976f52903a6a2ec3fe3
-
SSDEEP
768:AqqqqS36meOC/XSX7A2BZwKgIPDAcb7qwcI5WeVR2N2NfXjvtGQ4R8Cx672BUSUR:AqqqqS36meOC/XSX7A2BZwKgIPDAcb77
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4820 EXCEL.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4820 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE 4820 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\dbfd362f93939ba71ec688ca908954c9_JaffaCakes118.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4820