Analysis
-
max time kernel
133s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2025, 11:09
Behavioral task
behavioral1
Sample
JaffaCakes118_5ec8d1a0be3482a42f9bc81a129042aa.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5ec8d1a0be3482a42f9bc81a129042aa.xls
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_5ec8d1a0be3482a42f9bc81a129042aa.xls
-
Size
172KB
-
MD5
5ec8d1a0be3482a42f9bc81a129042aa
-
SHA1
44c383b8393cec22ed3266a5587f7fb5fc34dd9a
-
SHA256
bb0582197a14bfd068309c70e16c8a0a963fcdb17db8e72e0d315baa8ab2b83a
-
SHA512
e9846498b798da209d14f8e710a5a9ecc11f73db575eef233b10b7d0f1acfe6b6c502a21f88131eacb760a8a6cef6876402bdcb2404a9e36a29c16abf9fe6079
-
SSDEEP
3072:Mz1gxv7yZmspH7+cclKis86NqTBun5oV5O8CQgvWVbrzRbKS7ITkPSUDjXae5k1u:a1gxv7yZmspH7+cclKis86NqTBun5oV6
Malware Config
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1556 5632 cmd.exe 84 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4660 5632 cmd.exe 84 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 400 5632 cmd.exe 84 -
resource yara_rule behavioral2/files/0x000c000000023b8d-101.dat office_xlm_macros -
Deletes itself 1 IoCs
pid Process 5632 EXCEL.EXE -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\E2975E00\:Zone.Identifier:$DATA EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5632 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 5632 EXCEL.EXE 5632 EXCEL.EXE 5632 EXCEL.EXE 5632 EXCEL.EXE 5632 EXCEL.EXE 5632 EXCEL.EXE 5632 EXCEL.EXE 5632 EXCEL.EXE 5632 EXCEL.EXE 5632 EXCEL.EXE 5632 EXCEL.EXE 5632 EXCEL.EXE 5632 EXCEL.EXE 5632 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5632 wrote to memory of 400 5632 EXCEL.EXE 90 PID 5632 wrote to memory of 400 5632 EXCEL.EXE 90 PID 5632 wrote to memory of 4660 5632 EXCEL.EXE 91 PID 5632 wrote to memory of 4660 5632 EXCEL.EXE 91 PID 5632 wrote to memory of 1556 5632 EXCEL.EXE 92 PID 5632 wrote to memory of 1556 5632 EXCEL.EXE 92 PID 400 wrote to memory of 3748 400 cmd.exe 96 PID 400 wrote to memory of 3748 400 cmd.exe 96 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3748 attrib.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5ec8d1a0be3482a42f9bc81a129042aa.xls"1⤵
- Deletes itself
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5632 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\system32\attrib.exeattrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"3⤵
- Views/modifies file attributes
PID:3748
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
PID:4660
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c RD /S /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
PID:1556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD5817b8ae593fc38fbc789cf469bc52f07
SHA18929e1bbbdbd97aeee4c84f90a044f17634e06d7
SHA256966260947d3800f33724d2ffc59da74cd1272f09285d7462747c48cf309ad810
SHA512009c43dafc68425d5c5fa48c4ba205bad75faf814111e154e47e4bd170669678c9ec475722d44a7139effed4c7aeb158f278155197230b6f13cb674dfdf872ab
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5c2b4092ea9c904937e0723662fe197fa
SHA17d2d1f23e79ef104d56fce259c3a81904031ff9f
SHA25613e35ee699fc63cbd434d6d569d438b508d7ccf351287d0c27ddad26ad8455a7
SHA5127dc5924b239dda315ad845dd61b4f95e31eefcd8d695534f26c44bb6c0780cc1316a7f2fe718a10c6ad90c9c78eb0052018bd35d26c400869407b972dad9a8fc