Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/12/2024, 13:33
Behavioral task
behavioral1
Sample
d9dd4303ff2775177dbb700605beed2a_JaffaCakes118.xls
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
d9dd4303ff2775177dbb700605beed2a_JaffaCakes118.xls
Resource
win10v2004-20241007-en
General
-
Target
d9dd4303ff2775177dbb700605beed2a_JaffaCakes118.xls
-
Size
104KB
-
MD5
d9dd4303ff2775177dbb700605beed2a
-
SHA1
972fa6de501750c22a08ece65c48c4bfc789d935
-
SHA256
ad70a8559feac15561f4085b308c7b990ebe14017936c187341fe210e4666030
-
SHA512
cc38fd016d07c9ebc15298e16c51b7966bff1b521d19fc68413b4956d36a81f4b794d3f23d3e5e6b7e552b0920852406217f28c5253de7ababbbff2f0f96b815
-
SSDEEP
1536:0WWWWSJ4kkXZh+lCi4szenWVbrzQ7oVCkTkR62lXXxeXcJtXwodM2M/MylFd2:gGsWVbrzQ7oV9Tk95wMJtXwl5ked2
Malware Config
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 776 3276 cmd.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1944 3276 cmd.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4012 3276 cmd.exe 82 -
resource yara_rule behavioral2/files/0x000500000001e747-103.dat office_xlm_macros -
Deletes itself 1 IoCs
pid Process 3276 EXCEL.EXE -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\39875E00\:Zone.Identifier:$DATA EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3276 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3276 EXCEL.EXE 3276 EXCEL.EXE 3276 EXCEL.EXE 3276 EXCEL.EXE 3276 EXCEL.EXE 3276 EXCEL.EXE 3276 EXCEL.EXE 3276 EXCEL.EXE 3276 EXCEL.EXE 3276 EXCEL.EXE 3276 EXCEL.EXE 3276 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3276 wrote to memory of 4012 3276 EXCEL.EXE 87 PID 3276 wrote to memory of 4012 3276 EXCEL.EXE 87 PID 3276 wrote to memory of 1944 3276 EXCEL.EXE 88 PID 3276 wrote to memory of 1944 3276 EXCEL.EXE 88 PID 3276 wrote to memory of 776 3276 EXCEL.EXE 89 PID 3276 wrote to memory of 776 3276 EXCEL.EXE 89 PID 4012 wrote to memory of 1032 4012 cmd.exe 93 PID 4012 wrote to memory of 1032 4012 cmd.exe 93 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1032 attrib.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\d9dd4303ff2775177dbb700605beed2a_JaffaCakes118.xls"1⤵
- Deletes itself
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\system32\attrib.exeattrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"3⤵
- Views/modifies file attributes
PID:1032
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
PID:1944
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c RD /S /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
PID:776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
130KB
MD5d704a553bb64c0e8de1f97c32222090b
SHA1fff3982d67b933fc5fa2d6d8ef9d55d1fed3af5b
SHA256bcdc0d2ea126d807e29916338a39571dc533327fa1628fdd41771e2b50d30c0f
SHA51231bc1a28df43152fb886a7dff80cc94e4468c2d6a709ce2cdad67816e63aba82093c3669efc8b02711f6182becf7d6c33a79f53fdbc793a8436063ced9f0f997
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD57e084bb00079c905c002be3dbc63a1a6
SHA1af749cfe44720303fa37d7062ad26d96d2d29548
SHA256c37c074d3580176d3dfc705ceac9fe5d31d25d24eedf2c74dfce908b963e320e
SHA512f0a62731bba5047ee40c836933b2baf6168d92efe205361379370ad54572558ba7593dcc2cb632ddfa10b4a844d8ed65ae358860159d1d7c90f9cb0861a2122b