Analysis
-
max time kernel
133s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2024 20:18
Behavioral task
behavioral1
Sample
db5bd9950f2363e0621b32cfc683c07f_JaffaCakes118.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
db5bd9950f2363e0621b32cfc683c07f_JaffaCakes118.xls
Resource
win10v2004-20241007-en
General
-
Target
db5bd9950f2363e0621b32cfc683c07f_JaffaCakes118.xls
-
Size
259KB
-
MD5
db5bd9950f2363e0621b32cfc683c07f
-
SHA1
d04d53792f018fc754ed113438531b56b9433be3
-
SHA256
fc519e674d968685aef5c562eb84b1066f121d55108a4a1f2e74a5274eb3779c
-
SHA512
3c9e72756488d21fe7a626ec5d4c2720f28b8038988a8693b01f568abddd54c1a26426f52ab68f4332a5fc9d508039f172fec331ac3e76bdbc322a7be75e7dd1
-
SSDEEP
6144:6FUjl6Nc7yRzs1H75wkZUgsRQ6UHXtD+Iv50ArEMUih0e36UA6S:W
Malware Config
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4236 440 cmd.exe 81 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4024 440 cmd.exe 81 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4272 440 cmd.exe 81 -
resource yara_rule behavioral2/files/0x000b000000023b6d-102.dat office_xlm_macros -
Deletes itself 1 IoCs
pid Process 440 EXCEL.EXE -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\6A975E00\:Zone.Identifier:$DATA EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 440 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 440 EXCEL.EXE 440 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 440 EXCEL.EXE 440 EXCEL.EXE 440 EXCEL.EXE 440 EXCEL.EXE 440 EXCEL.EXE 440 EXCEL.EXE 440 EXCEL.EXE 440 EXCEL.EXE 440 EXCEL.EXE 440 EXCEL.EXE 440 EXCEL.EXE 440 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 440 wrote to memory of 4272 440 EXCEL.EXE 86 PID 440 wrote to memory of 4272 440 EXCEL.EXE 86 PID 440 wrote to memory of 4024 440 EXCEL.EXE 87 PID 440 wrote to memory of 4024 440 EXCEL.EXE 87 PID 440 wrote to memory of 4236 440 EXCEL.EXE 88 PID 440 wrote to memory of 4236 440 EXCEL.EXE 88 PID 4272 wrote to memory of 1140 4272 cmd.exe 94 PID 4272 wrote to memory of 1140 4272 cmd.exe 94 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1140 attrib.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\db5bd9950f2363e0621b32cfc683c07f_JaffaCakes118.xls"1⤵
- Deletes itself
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\system32\attrib.exeattrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"3⤵
- Views/modifies file attributes
PID:1140
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
PID:4024
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c RD /S /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
PID:4236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
278KB
MD561a25fbced372651d6e9c8780c6ee8fa
SHA1e2238c45996218d7630c6d54824109dd7f29cd9e
SHA25659b5797ee07cc12d8a7852865fd8b552c2b9d53eef0428d9c62379522547bf71
SHA5124622fcafe3910c821f05d906f4e882c81a17ac757a6ff12a00eceb8e6c0006bc14b2197a1c2e5c99ebc7e257f27b4b7bb17106d3ff1b100261968acc12ab74e7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize683B
MD5c6a49fd2d146e7880b78d77df387711c
SHA1f26c74e4bc436e3def060e8e247bcf9a62299c2f
SHA256a1baccbc2b3725c6faffc352db07eea4c56c2a72fbe8e64da3e590e5bbba0ec3
SHA512694a0dd86f4ef0b4352399b28402f22133fcbab5d8e9448bf33e71f119b3999901fec3f6ec48ecbda909c73c65225ac6f909affa0b1792efaf4632523b1ec9e8