Analysis
-
max time kernel
133s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2024 12:52
Behavioral task
behavioral1
Sample
d9b55e70ecb67c825d0da5dc5eda2daf_JaffaCakes118.xls
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
d9b55e70ecb67c825d0da5dc5eda2daf_JaffaCakes118.xls
Resource
win10v2004-20241007-en
General
-
Target
d9b55e70ecb67c825d0da5dc5eda2daf_JaffaCakes118.xls
-
Size
143KB
-
MD5
d9b55e70ecb67c825d0da5dc5eda2daf
-
SHA1
31a733754fbd8ed298bcaa1c811ef98cd152884f
-
SHA256
159e1a2e25ed59c5d13adec2e381dcca9461e27bb069d0e0f04f34ed2c42acda
-
SHA512
ebb0b4f9f5ff8fa7075465ec39466f90122b11e171fc818586d5aac778914ac4c272212606158ca7e45d54fcd2c7cddfe881cc98c86e98a9a5727331d4798918
-
SSDEEP
3072:BW42vWVbrzQ7ITk9B2AJtXwr5k0mfEifNdk:z2Qk
Malware Config
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1924 2260 cmd.exe 81 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2272 2260 cmd.exe 81 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4404 2260 cmd.exe 81 -
resource yara_rule behavioral2/files/0x000e000000023bd7-102.dat office_xlm_macros -
Deletes itself 1 IoCs
pid Process 2260 EXCEL.EXE -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\A3C75E00\:Zone.Identifier:$DATA EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2260 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2260 EXCEL.EXE 2260 EXCEL.EXE 2260 EXCEL.EXE 2260 EXCEL.EXE 2260 EXCEL.EXE 2260 EXCEL.EXE 2260 EXCEL.EXE 2260 EXCEL.EXE 2260 EXCEL.EXE 2260 EXCEL.EXE 2260 EXCEL.EXE 2260 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2260 wrote to memory of 1924 2260 EXCEL.EXE 86 PID 2260 wrote to memory of 1924 2260 EXCEL.EXE 86 PID 2260 wrote to memory of 2272 2260 EXCEL.EXE 87 PID 2260 wrote to memory of 2272 2260 EXCEL.EXE 87 PID 2260 wrote to memory of 4404 2260 EXCEL.EXE 88 PID 2260 wrote to memory of 4404 2260 EXCEL.EXE 88 PID 1924 wrote to memory of 4412 1924 cmd.exe 92 PID 1924 wrote to memory of 4412 1924 cmd.exe 92 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4412 attrib.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\d9b55e70ecb67c825d0da5dc5eda2daf_JaffaCakes118.xls"1⤵
- Deletes itself
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\system32\attrib.exeattrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"3⤵
- Views/modifies file attributes
PID:4412
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
PID:2272
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c RD /S /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
PID:4404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
131KB
MD5f7483ffeeee22af2ef4492f97b19dfcd
SHA1a65f43a222e4f7e1d94d01b57ace9af2f2ab6478
SHA25631484bd36f896dd21368f04903f6813fb058141a5b2e73ccbaceaafdd6c45099
SHA512a94762f4071579efb09a4e64316da5c132975bdf6b2835582dd5f6aabb002c3c95855db702bfa4c95e96e34e65f77fd27696a7387e0cddf194119ca60f7a6537
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize3KB
MD5a8fd5542968dda44fae14a867faba271
SHA12e72c0f63b604e3e4b3a0048f429c50907cd4cc1
SHA256637af1a203f7bd1fad712da6583c3520d4a9a954c838f15361c9dff1ae117461
SHA5125618163bf243ac8da7441a070f2347015592422d7549ce27778ec8cb5519beefeac6795c86cb3daa941c4f8ff556b9d37a462a5f17c724b1ac3b145d49554f19