Analysis

  • max time kernel
    133s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-12-2024 12:52

General

  • Target

    d9b55e70ecb67c825d0da5dc5eda2daf_JaffaCakes118.xls

  • Size

    143KB

  • MD5

    d9b55e70ecb67c825d0da5dc5eda2daf

  • SHA1

    31a733754fbd8ed298bcaa1c811ef98cd152884f

  • SHA256

    159e1a2e25ed59c5d13adec2e381dcca9461e27bb069d0e0f04f34ed2c42acda

  • SHA512

    ebb0b4f9f5ff8fa7075465ec39466f90122b11e171fc818586d5aac778914ac4c272212606158ca7e45d54fcd2c7cddfe881cc98c86e98a9a5727331d4798918

  • SSDEEP

    3072:BW42vWVbrzQ7ITk9B2AJtXwr5k0mfEifNdk:z2Qk

Malware Config

Signatures

  • Process spawned unexpected child process 3 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Suspicious Office macro 1 IoCs

    Office document equipped with 4.0 macros.

  • Deletes itself 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\d9b55e70ecb67c825d0da5dc5eda2daf_JaffaCakes118.xls"
    1⤵
    • Deletes itself
    • Checks processor information in registry
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2260
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:1924
      • C:\Windows\system32\attrib.exe
        attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
        3⤵
        • Views/modifies file attributes
        PID:4412
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c Del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
      2⤵
      • Process spawned unexpected child process
      PID:2272
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c RD /S /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
      2⤵
      • Process spawned unexpected child process
      PID:4404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\d9b55e70ecb67c825d0da5dc5eda2daf_JaffaCakes118.xls

    Filesize

    131KB

    MD5

    f7483ffeeee22af2ef4492f97b19dfcd

    SHA1

    a65f43a222e4f7e1d94d01b57ace9af2f2ab6478

    SHA256

    31484bd36f896dd21368f04903f6813fb058141a5b2e73ccbaceaafdd6c45099

    SHA512

    a94762f4071579efb09a4e64316da5c132975bdf6b2835582dd5f6aabb002c3c95855db702bfa4c95e96e34e65f77fd27696a7387e0cddf194119ca60f7a6537

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    3KB

    MD5

    a8fd5542968dda44fae14a867faba271

    SHA1

    2e72c0f63b604e3e4b3a0048f429c50907cd4cc1

    SHA256

    637af1a203f7bd1fad712da6583c3520d4a9a954c838f15361c9dff1ae117461

    SHA512

    5618163bf243ac8da7441a070f2347015592422d7549ce27778ec8cb5519beefeac6795c86cb3daa941c4f8ff556b9d37a462a5f17c724b1ac3b145d49554f19

  • memory/2260-15-0x00007FFF14FD0000-0x00007FFF151C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2260-1-0x00007FFED5050000-0x00007FFED5060000-memory.dmp

    Filesize

    64KB

  • memory/2260-0-0x00007FFF1506D000-0x00007FFF1506E000-memory.dmp

    Filesize

    4KB

  • memory/2260-8-0x00007FFF14FD0000-0x00007FFF151C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2260-4-0x00007FFED5050000-0x00007FFED5060000-memory.dmp

    Filesize

    64KB

  • memory/2260-9-0x00007FFF14FD0000-0x00007FFF151C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2260-10-0x00007FFF14FD0000-0x00007FFF151C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2260-13-0x00007FFED2800000-0x00007FFED2810000-memory.dmp

    Filesize

    64KB

  • memory/2260-11-0x00007FFF14FD0000-0x00007FFF151C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2260-14-0x00007FFF14FD0000-0x00007FFF151C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2260-12-0x00007FFF14FD0000-0x00007FFF151C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2260-16-0x00007FFF14FD0000-0x00007FFF151C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2260-17-0x00007FFED2800000-0x00007FFED2810000-memory.dmp

    Filesize

    64KB

  • memory/2260-18-0x00007FFF14FD0000-0x00007FFF151C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2260-5-0x00007FFED5050000-0x00007FFED5060000-memory.dmp

    Filesize

    64KB

  • memory/2260-6-0x00007FFF14FD0000-0x00007FFF151C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2260-3-0x00007FFED5050000-0x00007FFED5060000-memory.dmp

    Filesize

    64KB

  • memory/2260-47-0x00007FFF14FD0000-0x00007FFF151C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2260-57-0x00007FFF14FD0000-0x00007FFF151C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2260-56-0x00007FFF14FD0000-0x00007FFF151C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2260-55-0x00007FFF14FD0000-0x00007FFF151C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2260-46-0x00007FFF14FD0000-0x00007FFF151C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2260-58-0x00007FFF14FD0000-0x00007FFF151C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2260-63-0x00007FFF14FD0000-0x00007FFF151C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2260-71-0x00007FFF14FD0000-0x00007FFF151C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2260-2-0x00007FFED5050000-0x00007FFED5060000-memory.dmp

    Filesize

    64KB

  • memory/2260-104-0x00007FFF14FD0000-0x00007FFF151C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2260-105-0x00007FFF1506D000-0x00007FFF1506E000-memory.dmp

    Filesize

    4KB

  • memory/2260-106-0x00007FFF14FD0000-0x00007FFF151C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2260-110-0x00007FFF14FD0000-0x00007FFF151C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2260-7-0x00007FFF14FD0000-0x00007FFF151C5000-memory.dmp

    Filesize

    2.0MB