Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/12/2024, 14:25
Behavioral task
behavioral1
Sample
ebee2913b331bf90c3812bd8fd445120_JaffaCakes118.xlsm
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ebee2913b331bf90c3812bd8fd445120_JaffaCakes118.xlsm
Resource
win10v2004-20241007-en
General
-
Target
ebee2913b331bf90c3812bd8fd445120_JaffaCakes118.xlsm
-
Size
327KB
-
MD5
ebee2913b331bf90c3812bd8fd445120
-
SHA1
8fc2f42502baf00750cb3dd11867854007862c49
-
SHA256
437d674579de5ae68e8d07fd19c5a7fbc699af6e638933ed40df364616da6c9c
-
SHA512
345987b073194c79de25f7a785938fc50d353a49f0f6c917f5fc725fa53647de93ac1df415055580d1f55baf779301524ffd3a9efa5da984ddc82ee24757313d
-
SSDEEP
6144:QJ9HMInvpPbR/5L4YvQ6bgcsEEmi+efMi0oGM1Okn6kovIbvpHIjRYvMdTq:QJ9tRbtp4Wl8cnEQeNGkr6kdFoeYW
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1808 2988 mshta.exe 27 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2988 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2988 EXCEL.EXE 2988 EXCEL.EXE 2988 EXCEL.EXE 2988 EXCEL.EXE 2988 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2988 wrote to memory of 1808 2988 EXCEL.EXE 28 PID 2988 wrote to memory of 1808 2988 EXCEL.EXE 28 PID 2988 wrote to memory of 1808 2988 EXCEL.EXE 28 PID 2988 wrote to memory of 1808 2988 EXCEL.EXE 28
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\ebee2913b331bf90c3812bd8fd445120_JaffaCakes118.xlsm1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\mshta.exemshta C:\ProgramData\BfUlvoNvwCQ.sct2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:1808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD57db65e54310aaed3fb04256374af342b
SHA13b410a8df5306e79b983ac87e83f59af452f1bc6
SHA256d7dec0efff25b9fc75389e8e58dd6770ff9d175d768792240abae80d4d929091
SHA51207f022c749471f3ef731831505397907c82ff761e93e501c32705b1a5d96fdeb70d07d3f5bcf227129e2a5bdd6ac12754e7369cae41826ec6b6d05e3e7e583cb