Analysis
-
max time kernel
133s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2025, 17:30
Behavioral task
behavioral1
Sample
JaffaCakes118_5a5fc84085509e2b07953f02928d2d3e.xls
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5a5fc84085509e2b07953f02928d2d3e.xls
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_5a5fc84085509e2b07953f02928d2d3e.xls
-
Size
58KB
-
MD5
5a5fc84085509e2b07953f02928d2d3e
-
SHA1
841f4c19e6d5ad16d8d47f0513633a06b3d65a41
-
SHA256
1354e719634665581d78f9f833a098c76ebf96b4f31bd183f4cf4a9671f40bba
-
SHA512
b1079818ff4a0256b66e0681b8dec036350f9220441c15e3f4b1edfc9e49f71f5eb4aeae3835c56e837e263df42007968eb19bb6a77d7c673e84a37107d06ae3
-
SSDEEP
768:2BVM1LrYN1RwKz4glbzl4bTHqE0cwGiEdbC3WNQPPBLxW+EVWjBHQQBjt:+0gn2Tt0cwGiEd23WNQPPBc+2W5Q
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3596 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 3596 EXCEL.EXE 3596 EXCEL.EXE 3596 EXCEL.EXE 3596 EXCEL.EXE 3596 EXCEL.EXE 3596 EXCEL.EXE 3596 EXCEL.EXE 3596 EXCEL.EXE 3596 EXCEL.EXE 3596 EXCEL.EXE 3596 EXCEL.EXE 3596 EXCEL.EXE 3596 EXCEL.EXE 3596 EXCEL.EXE 3596 EXCEL.EXE 3596 EXCEL.EXE 3596 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5a5fc84085509e2b07953f02928d2d3e.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5da6d606ab9dc75398f92529cb2e4950c
SHA1afbe0893248bf63c313119d30e7d6eab629ec2fe
SHA2564376682595f7be193c54f7a618ecb2d4a84fc42f7ecdcc2e279b8f2fc18f50fe
SHA51224de56dfa1401a0af40a015596f480115dbe8db54675a0b45e3dd60e5d98e504165abdcb17568ac71be2374fe1b618008f59fef122189f75f048760aaaad5531
-
Filesize
8KB
MD59df60781ed259a3ee063b5a8adaaed03
SHA1ca60b617193cf4174ccf864e28b796b568a129bd
SHA25606027c4cd19945202175dcbb9ce0ff31eca5e62d98f5987dcc4e89ec38747c2b
SHA51285e3c890ad8250f24db75533ae93f35f5bb47e7dad7e12de15f44bdd8251fb2970013122aac473fc80cc2cea666ee718c090f874aa9cf10c58d2b3219fdca633
-
Filesize
8KB
MD565e359de47191a8e1e39bf976f70bdc1
SHA183ae326c44bc44666d4d3b8e9075310a1adf331a
SHA2561fa79d363bbe75dcdc922c698e6929d7227ad726a4d024511f5b1fcd87b27a46
SHA5121853e818a164938f51984bc67002399790839f271466675f739fcd17fa755b2ce1d973bcbfe231b7a989a00e1ee6fdb72ae7882f56d0e38f12011ca17900a07b
-
Filesize
416B
MD570f49c1a0983c4a6156e8211c6cf2bbd
SHA15bf91b59ce48f49a4f15d9d7de5b0c1d8e2ba40b
SHA256fbd86600de5a8ff88cb1e752a7f708d8c8ed2c7687d45b907654d9d543636485
SHA5125361971c71f95613a2926c0d22ef73d5b49fa74fc91a8d8cd8dbf18f5b3c46f0354048c380dd709aab45dfc2513c6487067fb045e0ba8ce9dffa44260b09c803
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize2KB
MD5d8f056237305747e5294cc9d9245f641
SHA1ad38722949d2741d43adb41b22f7604fee2b2e49
SHA256315335b75f0e0cb1306248d5bfc4e3a92b9ce3bf30a16305798554c4f974c9e9
SHA512e745ef81fe4df24bdd912cb59347ae6b974758758f5aa5da1ddcea6c8f4e6a157d5af2abdba69ddb2cd3be44537b53bcf223dda43092a2a29b0c500299627d6f