Analysis

  • max time kernel
    133s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-12-2024 20:18

General

  • Target

    db5bd9950f2363e0621b32cfc683c07f_JaffaCakes118.xls

  • Size

    259KB

  • MD5

    db5bd9950f2363e0621b32cfc683c07f

  • SHA1

    d04d53792f018fc754ed113438531b56b9433be3

  • SHA256

    fc519e674d968685aef5c562eb84b1066f121d55108a4a1f2e74a5274eb3779c

  • SHA512

    3c9e72756488d21fe7a626ec5d4c2720f28b8038988a8693b01f568abddd54c1a26426f52ab68f4332a5fc9d508039f172fec331ac3e76bdbc322a7be75e7dd1

  • SSDEEP

    6144:6FUjl6Nc7yRzs1H75wkZUgsRQ6UHXtD+Iv50ArEMUih0e36UA6S:W

Malware Config

Signatures

  • Process spawned unexpected child process 3 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Suspicious Office macro 1 IoCs

    Office document equipped with 4.0 macros.

  • Deletes itself 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\db5bd9950f2363e0621b32cfc683c07f_JaffaCakes118.xls"
    1⤵
    • Deletes itself
    • Checks processor information in registry
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:440
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:4272
      • C:\Windows\system32\attrib.exe
        attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
        3⤵
        • Views/modifies file attributes
        PID:1140
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c Del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
      2⤵
      • Process spawned unexpected child process
      PID:4024
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c RD /S /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
      2⤵
      • Process spawned unexpected child process
      PID:4236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\db5bd9950f2363e0621b32cfc683c07f_JaffaCakes118.xls

    Filesize

    278KB

    MD5

    61a25fbced372651d6e9c8780c6ee8fa

    SHA1

    e2238c45996218d7630c6d54824109dd7f29cd9e

    SHA256

    59b5797ee07cc12d8a7852865fd8b552c2b9d53eef0428d9c62379522547bf71

    SHA512

    4622fcafe3910c821f05d906f4e882c81a17ac757a6ff12a00eceb8e6c0006bc14b2197a1c2e5c99ebc7e257f27b4b7bb17106d3ff1b100261968acc12ab74e7

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    683B

    MD5

    c6a49fd2d146e7880b78d77df387711c

    SHA1

    f26c74e4bc436e3def060e8e247bcf9a62299c2f

    SHA256

    a1baccbc2b3725c6faffc352db07eea4c56c2a72fbe8e64da3e590e5bbba0ec3

    SHA512

    694a0dd86f4ef0b4352399b28402f22133fcbab5d8e9448bf33e71f119b3999901fec3f6ec48ecbda909c73c65225ac6f909affa0b1792efaf4632523b1ec9e8

  • memory/440-14-0x00007FFC18FF0000-0x00007FFC191E5000-memory.dmp

    Filesize

    2.0MB

  • memory/440-3-0x00007FFC1908D000-0x00007FFC1908E000-memory.dmp

    Filesize

    4KB

  • memory/440-2-0x00007FFBD9070000-0x00007FFBD9080000-memory.dmp

    Filesize

    64KB

  • memory/440-6-0x00007FFBD9070000-0x00007FFBD9080000-memory.dmp

    Filesize

    64KB

  • memory/440-7-0x00007FFC18FF0000-0x00007FFC191E5000-memory.dmp

    Filesize

    2.0MB

  • memory/440-8-0x00007FFC18FF0000-0x00007FFC191E5000-memory.dmp

    Filesize

    2.0MB

  • memory/440-10-0x00007FFC18FF0000-0x00007FFC191E5000-memory.dmp

    Filesize

    2.0MB

  • memory/440-9-0x00007FFC18FF0000-0x00007FFC191E5000-memory.dmp

    Filesize

    2.0MB

  • memory/440-11-0x00007FFBD6710000-0x00007FFBD6720000-memory.dmp

    Filesize

    64KB

  • memory/440-5-0x00007FFC18FF0000-0x00007FFC191E5000-memory.dmp

    Filesize

    2.0MB

  • memory/440-12-0x00007FFC18FF0000-0x00007FFC191E5000-memory.dmp

    Filesize

    2.0MB

  • memory/440-13-0x00007FFC18FF0000-0x00007FFC191E5000-memory.dmp

    Filesize

    2.0MB

  • memory/440-0-0x00007FFBD9070000-0x00007FFBD9080000-memory.dmp

    Filesize

    64KB

  • memory/440-4-0x00007FFBD9070000-0x00007FFBD9080000-memory.dmp

    Filesize

    64KB

  • memory/440-55-0x00007FFC18FF0000-0x00007FFC191E5000-memory.dmp

    Filesize

    2.0MB

  • memory/440-43-0x00007FFC18FF0000-0x00007FFC191E5000-memory.dmp

    Filesize

    2.0MB

  • memory/440-53-0x00007FFC18FF0000-0x00007FFC191E5000-memory.dmp

    Filesize

    2.0MB

  • memory/440-52-0x00007FFC18FF0000-0x00007FFC191E5000-memory.dmp

    Filesize

    2.0MB

  • memory/440-15-0x00007FFC18FF0000-0x00007FFC191E5000-memory.dmp

    Filesize

    2.0MB

  • memory/440-58-0x00007FFC18FF0000-0x00007FFC191E5000-memory.dmp

    Filesize

    2.0MB

  • memory/440-57-0x00007FFC18FF0000-0x00007FFC191E5000-memory.dmp

    Filesize

    2.0MB

  • memory/440-56-0x00007FFC18FF0000-0x00007FFC191E5000-memory.dmp

    Filesize

    2.0MB

  • memory/440-54-0x00007FFC18FF0000-0x00007FFC191E5000-memory.dmp

    Filesize

    2.0MB

  • memory/440-71-0x00007FFC18FF0000-0x00007FFC191E5000-memory.dmp

    Filesize

    2.0MB

  • memory/440-70-0x00007FFC18FF0000-0x00007FFC191E5000-memory.dmp

    Filesize

    2.0MB

  • memory/440-16-0x00007FFBD6710000-0x00007FFBD6720000-memory.dmp

    Filesize

    64KB

  • memory/440-107-0x00007FFC18FF0000-0x00007FFC191E5000-memory.dmp

    Filesize

    2.0MB

  • memory/440-1-0x00007FFBD9070000-0x00007FFBD9080000-memory.dmp

    Filesize

    64KB