Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2024 14:25
Behavioral task
behavioral1
Sample
ebee2913b331bf90c3812bd8fd445120_JaffaCakes118.xlsm
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ebee2913b331bf90c3812bd8fd445120_JaffaCakes118.xlsm
Resource
win10v2004-20241007-en
General
-
Target
ebee2913b331bf90c3812bd8fd445120_JaffaCakes118.xlsm
-
Size
327KB
-
MD5
ebee2913b331bf90c3812bd8fd445120
-
SHA1
8fc2f42502baf00750cb3dd11867854007862c49
-
SHA256
437d674579de5ae68e8d07fd19c5a7fbc699af6e638933ed40df364616da6c9c
-
SHA512
345987b073194c79de25f7a785938fc50d353a49f0f6c917f5fc725fa53647de93ac1df415055580d1f55baf779301524ffd3a9efa5da984ddc82ee24757313d
-
SSDEEP
6144:QJ9HMInvpPbR/5L4YvQ6bgcsEEmi+efMi0oGM1Okn6kovIbvpHIjRYvMdTq:QJ9tRbtp4Wl8cnEQeNGkr6kdFoeYW
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3640 3948 mshta.exe 81 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3948 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 3948 EXCEL.EXE 3948 EXCEL.EXE 3948 EXCEL.EXE 3948 EXCEL.EXE 3948 EXCEL.EXE 3948 EXCEL.EXE 3948 EXCEL.EXE 3948 EXCEL.EXE 3948 EXCEL.EXE 3948 EXCEL.EXE 3948 EXCEL.EXE 3948 EXCEL.EXE 3948 EXCEL.EXE 3948 EXCEL.EXE 3948 EXCEL.EXE 3948 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3948 wrote to memory of 3640 3948 EXCEL.EXE 85 PID 3948 wrote to memory of 3640 3948 EXCEL.EXE 85
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\ebee2913b331bf90c3812bd8fd445120_JaffaCakes118.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SYSTEM32\mshta.exemshta C:\ProgramData\BfUlvoNvwCQ.sct2⤵
- Process spawned unexpected child process
PID:3640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD57db65e54310aaed3fb04256374af342b
SHA13b410a8df5306e79b983ac87e83f59af452f1bc6
SHA256d7dec0efff25b9fc75389e8e58dd6770ff9d175d768792240abae80d4d929091
SHA51207f022c749471f3ef731831505397907c82ff761e93e501c32705b1a5d96fdeb70d07d3f5bcf227129e2a5bdd6ac12754e7369cae41826ec6b6d05e3e7e583cb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize2KB
MD54a2bf1b41ee2f9efdde5d7795673e05b
SHA1636e3cb8a65ff678ba894248f197a67bf101dbf6
SHA256fade407f3a3f3d89716a17d57d1e01c4847fdac61866d032362c96d2de7744ea
SHA5123c03f96c9663c6cff95e6e3a62a041ceefb67c0c4562f16887ff310d11bed02c590317477d69578dcc1502f1a41e87e91ec35a4d0a05c12b8689c29225fa3803