Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/12/2024, 13:33

General

  • Target

    d9dd4303ff2775177dbb700605beed2a_JaffaCakes118.xls

  • Size

    104KB

  • MD5

    d9dd4303ff2775177dbb700605beed2a

  • SHA1

    972fa6de501750c22a08ece65c48c4bfc789d935

  • SHA256

    ad70a8559feac15561f4085b308c7b990ebe14017936c187341fe210e4666030

  • SHA512

    cc38fd016d07c9ebc15298e16c51b7966bff1b521d19fc68413b4956d36a81f4b794d3f23d3e5e6b7e552b0920852406217f28c5253de7ababbbff2f0f96b815

  • SSDEEP

    1536:0WWWWSJ4kkXZh+lCi4szenWVbrzQ7oVCkTkR62lXXxeXcJtXwodM2M/MylFd2:gGsWVbrzQ7oV9Tk95wMJtXwl5ked2

Malware Config

Signatures

  • Process spawned unexpected child process 3 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Suspicious Office macro 1 IoCs

    Office document equipped with 4.0 macros.

  • Deletes itself 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\d9dd4303ff2775177dbb700605beed2a_JaffaCakes118.xls"
    1⤵
    • Deletes itself
    • Checks processor information in registry
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3276
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:4012
      • C:\Windows\system32\attrib.exe
        attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
        3⤵
        • Views/modifies file attributes
        PID:1032
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c Del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
      2⤵
      • Process spawned unexpected child process
      PID:1944
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c RD /S /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
      2⤵
      • Process spawned unexpected child process
      PID:776

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\d9dd4303ff2775177dbb700605beed2a_JaffaCakes118.xls

          Filesize

          130KB

          MD5

          d704a553bb64c0e8de1f97c32222090b

          SHA1

          fff3982d67b933fc5fa2d6d8ef9d55d1fed3af5b

          SHA256

          bcdc0d2ea126d807e29916338a39571dc533327fa1628fdd41771e2b50d30c0f

          SHA512

          31bc1a28df43152fb886a7dff80cc94e4468c2d6a709ce2cdad67816e63aba82093c3669efc8b02711f6182becf7d6c33a79f53fdbc793a8436063ced9f0f997

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

          Filesize

          1KB

          MD5

          7e084bb00079c905c002be3dbc63a1a6

          SHA1

          af749cfe44720303fa37d7062ad26d96d2d29548

          SHA256

          c37c074d3580176d3dfc705ceac9fe5d31d25d24eedf2c74dfce908b963e320e

          SHA512

          f0a62731bba5047ee40c836933b2baf6168d92efe205361379370ad54572558ba7593dcc2cb632ddfa10b4a844d8ed65ae358860159d1d7c90f9cb0861a2122b

        • memory/3276-15-0x00007FF9EDBF0000-0x00007FF9EDDE5000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-4-0x00007FF9ADC70000-0x00007FF9ADC80000-memory.dmp

          Filesize

          64KB

        • memory/3276-2-0x00007FF9ADC70000-0x00007FF9ADC80000-memory.dmp

          Filesize

          64KB

        • memory/3276-6-0x00007FF9EDBF0000-0x00007FF9EDDE5000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-5-0x00007FF9EDBF0000-0x00007FF9EDDE5000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-8-0x00007FF9EDBF0000-0x00007FF9EDDE5000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-7-0x00007FF9ADC70000-0x00007FF9ADC80000-memory.dmp

          Filesize

          64KB

        • memory/3276-9-0x00007FF9EDBF0000-0x00007FF9EDDE5000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-10-0x00007FF9AB3F0000-0x00007FF9AB400000-memory.dmp

          Filesize

          64KB

        • memory/3276-11-0x00007FF9EDBF0000-0x00007FF9EDDE5000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-12-0x00007FF9EDBF0000-0x00007FF9EDDE5000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-13-0x00007FF9AB3F0000-0x00007FF9AB400000-memory.dmp

          Filesize

          64KB

        • memory/3276-14-0x00007FF9EDBF0000-0x00007FF9EDDE5000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-16-0x00007FF9EDBF0000-0x00007FF9EDDE5000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-18-0x00007FF9EDBF0000-0x00007FF9EDDE5000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-17-0x00007FF9EDBF0000-0x00007FF9EDDE5000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-55-0x00007FF9EDBF0000-0x00007FF9EDDE5000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-1-0x00007FF9EDC8D000-0x00007FF9EDC8E000-memory.dmp

          Filesize

          4KB

        • memory/3276-106-0x00007FF9EDC8D000-0x00007FF9EDC8E000-memory.dmp

          Filesize

          4KB

        • memory/3276-54-0x00007FF9EDBF0000-0x00007FF9EDDE5000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-57-0x00007FF9EDBF0000-0x00007FF9EDDE5000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-56-0x00007FF9EDBF0000-0x00007FF9EDDE5000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-58-0x00007FF9EDBF0000-0x00007FF9EDDE5000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-71-0x00007FF9EDBF0000-0x00007FF9EDDE5000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-63-0x00007FF9EDBF0000-0x00007FF9EDDE5000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-72-0x00007FF9EDBF0000-0x00007FF9EDDE5000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-3-0x00007FF9ADC70000-0x00007FF9ADC80000-memory.dmp

          Filesize

          64KB

        • memory/3276-105-0x00007FF9EDBF0000-0x00007FF9EDDE5000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-46-0x00007FF9EDBF0000-0x00007FF9EDDE5000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-107-0x00007FF9EDBF0000-0x00007FF9EDDE5000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-108-0x00007FF9EDBF0000-0x00007FF9EDDE5000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-109-0x00007FF9EDBF0000-0x00007FF9EDDE5000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-110-0x00007FF9EDBF0000-0x00007FF9EDDE5000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-111-0x00007FF9EDBF0000-0x00007FF9EDDE5000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-115-0x00007FF9EDBF0000-0x00007FF9EDDE5000-memory.dmp

          Filesize

          2.0MB

        • memory/3276-0-0x00007FF9ADC70000-0x00007FF9ADC80000-memory.dmp

          Filesize

          64KB