Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 20:02
Behavioral task
behavioral1
Sample
e80bb8df666738e92e20ad6ebe37799c_JaffaCakes118.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e80bb8df666738e92e20ad6ebe37799c_JaffaCakes118.xls
Resource
win10v2004-20241007-en
General
-
Target
e80bb8df666738e92e20ad6ebe37799c_JaffaCakes118.xls
-
Size
30KB
-
MD5
e80bb8df666738e92e20ad6ebe37799c
-
SHA1
20b7c28bc0ff9b896d74d08646eaed7edd0aaf35
-
SHA256
ce468da8d7eee4032998bee3c1ebadd2b96511eb1e63ef52d1d12899312daaf5
-
SHA512
c74582d1da69f3445716e35e2ad9916f2cb5e4fd1ffe42bef497457808242e074f88f66d8da184c70033ef68801b76ea49a1d589bde0cbc87c24bb9dc10e398c
-
SSDEEP
384:5NMfAgj0e8kIPSgUip0esIhxbRSSFxgv5Tp+OTAi7WR0Y:5NQfMjUi7hJRSSFChV+OTATj
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4304 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4304 EXCEL.EXE 4304 EXCEL.EXE 4304 EXCEL.EXE 4304 EXCEL.EXE 4304 EXCEL.EXE 4304 EXCEL.EXE 4304 EXCEL.EXE 4304 EXCEL.EXE 4304 EXCEL.EXE 4304 EXCEL.EXE 4304 EXCEL.EXE 4304 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\e80bb8df666738e92e20ad6ebe37799c_JaffaCakes118.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5d18be9d194b53f52e0739ddc5a59a83f
SHA18c2bc780ef5f468780bed41b2e49f92fd915036f
SHA256fdaad8f8c8445683a1ba5258261df31008796e7c6f407e438d68589d3d9cfee7
SHA512c2fbc7428f5be7574625607e9bd294e9f5ed02e2419df77dd47e36a9a3f59ae7f7c0be3d88a9fe3601bf2cefd20935e96907cc3e4147a3735584e316f09a8dbf