Analysis
-
max time kernel
133s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 04:47
Behavioral task
behavioral1
Sample
e4c1adaab6b740a2f6ee731c79f308f1_JaffaCakes118.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e4c1adaab6b740a2f6ee731c79f308f1_JaffaCakes118.xlsm
Resource
win10v2004-20241007-en
General
-
Target
e4c1adaab6b740a2f6ee731c79f308f1_JaffaCakes118.xlsm
-
Size
324KB
-
MD5
e4c1adaab6b740a2f6ee731c79f308f1
-
SHA1
1ef4e4bec72a3faa1bc8ff308de84680f400d959
-
SHA256
bf5e1faf7848b57c44fd8efa81e130aad8b408426fc11438316fcba020a43205
-
SHA512
a8370ba30fe53129781b65ec32b8657d1793a5786f9b416133e29ca430039419ee964ef993f21c30bc00e88e74e51a1cf730a656012ae7240d56b1be126a3241
-
SSDEEP
6144:Q29HMInvpPbR/5L4YvQ6bgcsEEmi+efMi0oGckzEflqHcHLcvMReiAXtD74dN:Q29tRbtp4Wl8cnEQeNGJwlKcAWktDQN
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 320 1396 mshta.exe 81 -
Blocklisted process makes network request 9 IoCs
flow pid Process 25 320 mshta.exe 28 320 mshta.exe 30 320 mshta.exe 35 320 mshta.exe 40 320 mshta.exe 42 320 mshta.exe 44 320 mshta.exe 49 320 mshta.exe 51 320 mshta.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1396 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 1396 EXCEL.EXE 1396 EXCEL.EXE 1396 EXCEL.EXE 1396 EXCEL.EXE 1396 EXCEL.EXE 1396 EXCEL.EXE 1396 EXCEL.EXE 1396 EXCEL.EXE 1396 EXCEL.EXE 1396 EXCEL.EXE 1396 EXCEL.EXE 1396 EXCEL.EXE 1396 EXCEL.EXE 1396 EXCEL.EXE 1396 EXCEL.EXE 1396 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1396 wrote to memory of 320 1396 EXCEL.EXE 86 PID 1396 wrote to memory of 320 1396 EXCEL.EXE 86
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\e4c1adaab6b740a2f6ee731c79f308f1_JaffaCakes118.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SYSTEM32\mshta.exemshta C:\ProgramData\VbjzOZCEeMzhHe.sct2⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
PID:320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD54d5b71265230f86b595a6dff2ec92d7f
SHA111d4b16c6aa6b650a8f5ec8a81f1b5ecba7b2025
SHA2563fb6338310d7013b643f1770ca6c94a12d7e020f440d7d5803c9161abb840462
SHA512477aa5cebc2a861bfc56204c6c0035ffc01b77aa22e4f2a568f336c37bfba4e713b703de9b78fb2f1e3b7cb3b39699e1202c681ad88925fb0e9ca5e19799097f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize680B
MD5e78ad79c6579c1379f016c7ffe6f67b0
SHA109f3a39ecc2d0e484368e44e840300997997d72b
SHA25669a3a9a37172131511a7c8dd8385657de494d7d13f2827ff989bf95eee7a9130
SHA512178edcecf09f31e919f6afb59ba5d92e8c51deb4ad7971c1be89b1c3a2214431b146833b2a88c96578ce2c279bd576f086a8be05f34dcb38776da2d3631f959a