Analysis
-
max time kernel
133s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/12/2024, 00:25
Behavioral task
behavioral1
Sample
dc2e12f5cbaa6953bbaee98ef7651504_JaffaCakes118.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
dc2e12f5cbaa6953bbaee98ef7651504_JaffaCakes118.xls
Resource
win10v2004-20241007-en
General
-
Target
dc2e12f5cbaa6953bbaee98ef7651504_JaffaCakes118.xls
-
Size
125KB
-
MD5
dc2e12f5cbaa6953bbaee98ef7651504
-
SHA1
6550ed4a8fa0ed2f4aa5640f2f73c0bcadcc17a8
-
SHA256
e3579c554233c38ec4824e0f798742892335f81b954f7bb98992cda5bb928717
-
SHA512
61a6b5c24ffc21f5ba5d0c3e28dbd0e6ca4f94ae5171d4a4ee4c097ec42574d6104d176c9c4e9a5d0f525fbb9c39c65f90a7760d1440ecd697e95249bffe01ad
-
SSDEEP
1536:NXXXzUPaT3LehKpR0dYFZpWVbrzQ7ITkR62ldM88ScJtXwReM2M/MPIU:GaT36hS7WVbrzQ7ITk9EjhJtXwf5kQU
Malware Config
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 740 3416 cmd.exe 84 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2392 3416 cmd.exe 84 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2540 3416 cmd.exe 84 -
resource yara_rule behavioral2/files/0x0002000000022999-101.dat office_xlm_macros -
Deletes itself 1 IoCs
pid Process 3416 EXCEL.EXE -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\3FB75E00\:Zone.Identifier:$DATA EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3416 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3416 EXCEL.EXE 3416 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 3416 EXCEL.EXE 3416 EXCEL.EXE 3416 EXCEL.EXE 3416 EXCEL.EXE 3416 EXCEL.EXE 3416 EXCEL.EXE 3416 EXCEL.EXE 3416 EXCEL.EXE 3416 EXCEL.EXE 3416 EXCEL.EXE 3416 EXCEL.EXE 3416 EXCEL.EXE 3416 EXCEL.EXE 3416 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3416 wrote to memory of 2540 3416 EXCEL.EXE 88 PID 3416 wrote to memory of 2540 3416 EXCEL.EXE 88 PID 3416 wrote to memory of 2392 3416 EXCEL.EXE 89 PID 3416 wrote to memory of 2392 3416 EXCEL.EXE 89 PID 3416 wrote to memory of 740 3416 EXCEL.EXE 90 PID 3416 wrote to memory of 740 3416 EXCEL.EXE 90 PID 2540 wrote to memory of 2864 2540 cmd.exe 94 PID 2540 wrote to memory of 2864 2540 cmd.exe 94 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2864 attrib.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\dc2e12f5cbaa6953bbaee98ef7651504_JaffaCakes118.xls"1⤵
- Deletes itself
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\system32\attrib.exeattrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"3⤵
- Views/modifies file attributes
PID:2864
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
PID:2392
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c RD /S /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
PID:740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
147KB
MD5c9a13d50b07d86c53f33c1f4358690c6
SHA1da17adea02cf2d3637f4fc7ec4fb99ac1c9c27a6
SHA256fa75fdcfead5034aa529735b95d6c74c1b802952a65abffdabce8c7baced4e9c
SHA512464474f40ebedb20150e01b080b39e12bc59988be27991c71291ae7a0fd0b690afd8aab2f9cfdbcae5144ed251396875cade2e42ca2c524cfab5cd84f2f99a34
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize2KB
MD5308d19721ae0cd24e571eed77b74444d
SHA18b2fe3ad4d31a4418d74fd6a5c7be23b73ca3937
SHA256878bb4450a8767ec588dc985901bdb1fd85fe1ad7452679804797046667c3cde
SHA5127478995fab4871582a6175d1e10f74199bf2b5d6eb59c1615188d7565dfa8215cb1266d58ccb77b372d06726a945fe9b5d46698b6d831790b2762c1a7fd6d4c9