Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 23:55
Behavioral task
behavioral1
Sample
JaffaCakes118_98f6d1e3731105cd4259e79a41c314e1c62454d39b8b0427b3ec0f789fb6bddc.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_98f6d1e3731105cd4259e79a41c314e1c62454d39b8b0427b3ec0f789fb6bddc.xls
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_98f6d1e3731105cd4259e79a41c314e1c62454d39b8b0427b3ec0f789fb6bddc.xls
-
Size
24KB
-
MD5
1707c2be2eacf003e518c52123c121e1
-
SHA1
b83762f18620a60856c92ee84b83d60590c4bc8f
-
SHA256
98f6d1e3731105cd4259e79a41c314e1c62454d39b8b0427b3ec0f789fb6bddc
-
SHA512
dfaf2439b36e5893eb65a0e8a5408224359fb8abbd1d868c1dd987a6bb0035e9fa53b0442a2cfb70b66bbfdb99820caacb43378b14e86e4fb2b7c5ceadc9f739
-
SSDEEP
384:6tzIsi+G8kt0bjl8rGphjq3rmnohTjX7BsuqQ1MfM9/aGPP5Kia4Rr7aY/b0:Dsi+DbVppqbmnohTJj1dB3wA12Y/b0
Malware Config
Extracted
metasploit
windows/download_exec
http://shinyobjects.birds:80/metal.exe
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3568 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3568 EXCEL.EXE 3568 EXCEL.EXE 3568 EXCEL.EXE 3568 EXCEL.EXE 3568 EXCEL.EXE 3568 EXCEL.EXE 3568 EXCEL.EXE 3568 EXCEL.EXE 3568 EXCEL.EXE 3568 EXCEL.EXE 3568 EXCEL.EXE 3568 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98f6d1e3731105cd4259e79a41c314e1c62454d39b8b0427b3ec0f789fb6bddc.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3568