Analysis
-
max time kernel
0s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10/12/2024, 21:37
Behavioral task
behavioral1
Sample
de98d776c5eec7e096b9df072cc76848_JaffaCakes118.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
de98d776c5eec7e096b9df072cc76848_JaffaCakes118.xls
Resource
win10v2004-20241007-en
General
-
Target
de98d776c5eec7e096b9df072cc76848_JaffaCakes118.xls
-
Size
110KB
-
MD5
de98d776c5eec7e096b9df072cc76848
-
SHA1
58da45aa7a9d663fb70c5ce81e83faa1c7d2a1a4
-
SHA256
0e13dcc22c6b4dd7b181996324292946aa95835273a3c851b181a4119586659c
-
SHA512
63d66ddc54ee65ead84564d856204815b75eb95fab09e25609e24bc013cbcd93a822fc46ac3f0e2e676617ab76098482415143b46871b5e00e923a91ae6fdf25
-
SSDEEP
3072:uFl6Nc7yRzs1H75wkZUgsQ6NqTBun5owWVbrznye7ITk9N2AJtXwxv4k:Cl6Nc7yRzs1H75wkZUgsQ6NqTBun5oD1
Malware Config
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1316 1528 cmd.exe 29 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2828 1528 cmd.exe 29 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2948 1528 cmd.exe 29 -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1528 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1528 EXCEL.EXE 1528 EXCEL.EXE 1528 EXCEL.EXE -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2728 attrib.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\de98d776c5eec7e096b9df072cc76848_JaffaCakes118.xls1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1528 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
PID:2948 -
C:\Windows\SysWOW64\attrib.exeattrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"3⤵
- Views/modifies file attributes
PID:2728
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
PID:2828
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c RD /S /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
PID:1316
-