Analysis

  • max time kernel
    149s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/12/2024, 06:18

General

  • Target

    e038e28f7a1788b1135d89552c71b937_JaffaCakes118.xls

  • Size

    36KB

  • MD5

    e038e28f7a1788b1135d89552c71b937

  • SHA1

    f88bd72d4d3f40c9abccfb885775bdf3e934f729

  • SHA256

    d6b9ba7711114e7e0fff780f4807474078b897e6e2d68989a63f5cc2a627124b

  • SHA512

    fe565e834e1c92247f97c4ca98e490f0ef5bb5915ae469c8ff768fac69fd8c8d6241f51e3fea3a0301d7bff86a93b6e4198ed25c6a94bba4e4e4cce43e0e1139

  • SSDEEP

    768:cPqNk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJxAusmLqbfls:Iok3hbdlylKsgqopeJBWhZFGkE+cL2Na

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\e038e28f7a1788b1135d89552c71b937_JaffaCakes118.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4900
    • C:\Windows\explorer.exe
      explorer.exe C:\Users\Public\Documents\m0M.vbs
      2⤵
      • Process spawned unexpected child process
      PID:1216
  • C:\Windows\explorer.exe
    C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:384
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Public\Documents\m0M.vbs"
      2⤵
        PID:1312

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Public\Documents\m0M.vbs

            Filesize

            548B

            MD5

            343b6a3319984b44a086e8a0cd927cd8

            SHA1

            3aedca56351ea8609301e0f4c8a7e09daa0b404a

            SHA256

            c6545d8df076cea6e855ee660a98336708960df66421374e163840fe364e3543

            SHA512

            3e0bc88124a345057d98f41de90e308ebe47c000b0cc022a35fb374eccbfdb887690506e099d11fe8ebbc40fd62fc3e6b88a6f9580be8b35ffa8cb33d9918758

          • memory/4900-11-0x00007FFF47630000-0x00007FFF47825000-memory.dmp

            Filesize

            2.0MB

          • memory/4900-14-0x00007FFF47630000-0x00007FFF47825000-memory.dmp

            Filesize

            2.0MB

          • memory/4900-1-0x00007FFF076B0000-0x00007FFF076C0000-memory.dmp

            Filesize

            64KB

          • memory/4900-6-0x00007FFF076B0000-0x00007FFF076C0000-memory.dmp

            Filesize

            64KB

          • memory/4900-8-0x00007FFF47630000-0x00007FFF47825000-memory.dmp

            Filesize

            2.0MB

          • memory/4900-7-0x00007FFF47630000-0x00007FFF47825000-memory.dmp

            Filesize

            2.0MB

          • memory/4900-12-0x00007FFF47630000-0x00007FFF47825000-memory.dmp

            Filesize

            2.0MB

          • memory/4900-10-0x00007FFF47630000-0x00007FFF47825000-memory.dmp

            Filesize

            2.0MB

          • memory/4900-0-0x00007FFF076B0000-0x00007FFF076C0000-memory.dmp

            Filesize

            64KB

          • memory/4900-16-0x00007FFF04DB0000-0x00007FFF04DC0000-memory.dmp

            Filesize

            64KB

          • memory/4900-2-0x00007FFF476CD000-0x00007FFF476CE000-memory.dmp

            Filesize

            4KB

          • memory/4900-13-0x00007FFF47630000-0x00007FFF47825000-memory.dmp

            Filesize

            2.0MB

          • memory/4900-15-0x00007FFF47630000-0x00007FFF47825000-memory.dmp

            Filesize

            2.0MB

          • memory/4900-17-0x00007FFF04DB0000-0x00007FFF04DC0000-memory.dmp

            Filesize

            64KB

          • memory/4900-9-0x00007FFF47630000-0x00007FFF47825000-memory.dmp

            Filesize

            2.0MB

          • memory/4900-18-0x00007FFF47630000-0x00007FFF47825000-memory.dmp

            Filesize

            2.0MB

          • memory/4900-5-0x00007FFF47630000-0x00007FFF47825000-memory.dmp

            Filesize

            2.0MB

          • memory/4900-19-0x00007FFF47630000-0x00007FFF47825000-memory.dmp

            Filesize

            2.0MB

          • memory/4900-4-0x00007FFF076B0000-0x00007FFF076C0000-memory.dmp

            Filesize

            64KB

          • memory/4900-20-0x00007FFF47630000-0x00007FFF47825000-memory.dmp

            Filesize

            2.0MB

          • memory/4900-3-0x00007FFF076B0000-0x00007FFF076C0000-memory.dmp

            Filesize

            64KB

          • memory/4900-32-0x00007FFF47630000-0x00007FFF47825000-memory.dmp

            Filesize

            2.0MB

          • memory/4900-36-0x00007FFF47630000-0x00007FFF47825000-memory.dmp

            Filesize

            2.0MB