Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-12-2024 23:55

General

  • Target

    JaffaCakes118_98f6d1e3731105cd4259e79a41c314e1c62454d39b8b0427b3ec0f789fb6bddc.xls

  • Size

    24KB

  • MD5

    1707c2be2eacf003e518c52123c121e1

  • SHA1

    b83762f18620a60856c92ee84b83d60590c4bc8f

  • SHA256

    98f6d1e3731105cd4259e79a41c314e1c62454d39b8b0427b3ec0f789fb6bddc

  • SHA512

    dfaf2439b36e5893eb65a0e8a5408224359fb8abbd1d868c1dd987a6bb0035e9fa53b0442a2cfb70b66bbfdb99820caacb43378b14e86e4fb2b7c5ceadc9f739

  • SSDEEP

    384:6tzIsi+G8kt0bjl8rGphjq3rmnohTjX7BsuqQ1MfM9/aGPP5Kia4Rr7aY/b0:Dsi+DbVppqbmnohTJj1dB3wA12Y/b0

Malware Config

Extracted

Family

metasploit

Version

windows/download_exec

C2

http://shinyobjects.birds:80/metal.exe

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98f6d1e3731105cd4259e79a41c314e1c62454d39b8b0427b3ec0f789fb6bddc.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3568-0-0x00007FFCCB3D0000-0x00007FFCCB3E0000-memory.dmp

    Filesize

    64KB

  • memory/3568-1-0x00007FFD0B3ED000-0x00007FFD0B3EE000-memory.dmp

    Filesize

    4KB

  • memory/3568-3-0x00007FFCCB3D0000-0x00007FFCCB3E0000-memory.dmp

    Filesize

    64KB

  • memory/3568-2-0x00007FFCCB3D0000-0x00007FFCCB3E0000-memory.dmp

    Filesize

    64KB

  • memory/3568-4-0x00007FFCCB3D0000-0x00007FFCCB3E0000-memory.dmp

    Filesize

    64KB

  • memory/3568-7-0x00007FFD0B350000-0x00007FFD0B545000-memory.dmp

    Filesize

    2.0MB

  • memory/3568-6-0x00007FFD0B350000-0x00007FFD0B545000-memory.dmp

    Filesize

    2.0MB

  • memory/3568-13-0x00007FFD0B350000-0x00007FFD0B545000-memory.dmp

    Filesize

    2.0MB

  • memory/3568-15-0x00007FFD0B350000-0x00007FFD0B545000-memory.dmp

    Filesize

    2.0MB

  • memory/3568-17-0x00007FFD0B350000-0x00007FFD0B545000-memory.dmp

    Filesize

    2.0MB

  • memory/3568-20-0x00007FFCC8D20000-0x00007FFCC8D30000-memory.dmp

    Filesize

    64KB

  • memory/3568-19-0x00007FFD0B350000-0x00007FFD0B545000-memory.dmp

    Filesize

    2.0MB

  • memory/3568-18-0x00007FFD0B350000-0x00007FFD0B545000-memory.dmp

    Filesize

    2.0MB

  • memory/3568-16-0x00007FFD0B350000-0x00007FFD0B545000-memory.dmp

    Filesize

    2.0MB

  • memory/3568-14-0x00007FFCC8D20000-0x00007FFCC8D30000-memory.dmp

    Filesize

    64KB

  • memory/3568-12-0x00007FFD0B350000-0x00007FFD0B545000-memory.dmp

    Filesize

    2.0MB

  • memory/3568-10-0x00007FFD0B350000-0x00007FFD0B545000-memory.dmp

    Filesize

    2.0MB

  • memory/3568-9-0x00007FFD0B350000-0x00007FFD0B545000-memory.dmp

    Filesize

    2.0MB

  • memory/3568-8-0x00007FFD0B350000-0x00007FFD0B545000-memory.dmp

    Filesize

    2.0MB

  • memory/3568-11-0x00007FFD0B350000-0x00007FFD0B545000-memory.dmp

    Filesize

    2.0MB

  • memory/3568-5-0x00007FFCCB3D0000-0x00007FFCCB3E0000-memory.dmp

    Filesize

    64KB

  • memory/3568-33-0x00007FFD0B350000-0x00007FFD0B545000-memory.dmp

    Filesize

    2.0MB

  • memory/3568-32-0x0000015488BB0000-0x0000015488BB1000-memory.dmp

    Filesize

    4KB

  • memory/3568-35-0x00007FFD0B350000-0x00007FFD0B545000-memory.dmp

    Filesize

    2.0MB