Analysis
-
max time kernel
146s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2025, 12:57
Behavioral task
behavioral1
Sample
JaffaCakes118_6b2b9d42581d755c3f423a3a273796f5.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6b2b9d42581d755c3f423a3a273796f5.xls
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_6b2b9d42581d755c3f423a3a273796f5.xls
-
Size
296KB
-
MD5
6b2b9d42581d755c3f423a3a273796f5
-
SHA1
cfdc7aa01f169b4995d7f4dea63fe88264ba5069
-
SHA256
0fe6d78e321028b931c3c1dbc467b2db424a333803f06db7f60311d11b15917f
-
SHA512
1657ee63f2fcff6febbe6020bc9a602c259bf9d53ad6b2a4cbed1cdd6f42ec384c6bd90b9ca9b2b54e1328225364ff6ee81bcd52d14fca6e2ca41da24aa3f80a
-
SSDEEP
6144:rf5VC9ECYkyTClYAZfcBvEHVwbPgcUk9l0uq0l+65Xo/5jW:rfD1CWWEiybPgz5M2/5
Malware Config
Signatures
-
Process spawned unexpected child process 6 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3496 3472 cmd.exe 85 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2948 3472 cmd.exe 85 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 832 3472 cmd.exe 85 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1624 3472 cmd.exe 85 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1468 3472 cmd.exe 85 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4132 3472 cmd.exe 85 -
Office macro that triggers on suspicious action 2 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule behavioral2/files/0x0008000000023d3d-80.dat office_macro_on_action behavioral2/files/0x000c000000023be6-101.dat office_macro_on_action -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 3156 attrib.exe 4372 attrib.exe -
resource yara_rule behavioral2/files/0x0008000000023d3d-80.dat office_xlm_macros behavioral2/files/0x000c000000023be6-101.dat office_xlm_macros -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Internet.exe = "internet.exe" EXCEL.EXE -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\System32\internet.exe EXCEL.EXE -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3472 EXCEL.EXE 408 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 25 IoCs
pid Process 3472 EXCEL.EXE 3472 EXCEL.EXE 3472 EXCEL.EXE 3472 EXCEL.EXE 3472 EXCEL.EXE 3472 EXCEL.EXE 3472 EXCEL.EXE 3472 EXCEL.EXE 3472 EXCEL.EXE 3472 EXCEL.EXE 3472 EXCEL.EXE 3472 EXCEL.EXE 3472 EXCEL.EXE 3472 EXCEL.EXE 408 WINWORD.EXE 408 WINWORD.EXE 408 WINWORD.EXE 3472 EXCEL.EXE 3472 EXCEL.EXE 3472 EXCEL.EXE 3472 EXCEL.EXE 3472 EXCEL.EXE 3472 EXCEL.EXE 3472 EXCEL.EXE 3472 EXCEL.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3472 wrote to memory of 3496 3472 EXCEL.EXE 91 PID 3472 wrote to memory of 3496 3472 EXCEL.EXE 91 PID 3496 wrote to memory of 1800 3496 cmd.exe 93 PID 3496 wrote to memory of 1800 3496 cmd.exe 93 PID 3472 wrote to memory of 2948 3472 EXCEL.EXE 94 PID 3472 wrote to memory of 2948 3472 EXCEL.EXE 94 PID 2948 wrote to memory of 4152 2948 cmd.exe 96 PID 2948 wrote to memory of 4152 2948 cmd.exe 96 PID 3472 wrote to memory of 832 3472 EXCEL.EXE 97 PID 3472 wrote to memory of 832 3472 EXCEL.EXE 97 PID 832 wrote to memory of 3220 832 cmd.exe 99 PID 832 wrote to memory of 3220 832 cmd.exe 99 PID 3472 wrote to memory of 1624 3472 EXCEL.EXE 100 PID 3472 wrote to memory of 1624 3472 EXCEL.EXE 100 PID 3472 wrote to memory of 1468 3472 EXCEL.EXE 107 PID 3472 wrote to memory of 1468 3472 EXCEL.EXE 107 PID 1468 wrote to memory of 3156 1468 cmd.exe 109 PID 1468 wrote to memory of 3156 1468 cmd.exe 109 PID 3472 wrote to memory of 4132 3472 EXCEL.EXE 110 PID 3472 wrote to memory of 4132 3472 EXCEL.EXE 110 PID 4132 wrote to memory of 4372 4132 cmd.exe 112 PID 4132 wrote to memory of 4372 4132 cmd.exe 112 -
Views/modifies file attributes 1 TTPs 4 IoCs
pid Process 4372 attrib.exe 1800 attrib.exe 4152 attrib.exe 3156 attrib.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6b2b9d42581d755c3f423a3a273796f5.xls"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c attrib -s -h c:\setflag.exe2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\system32\attrib.exeattrib -s -h c:\setflag.exe3⤵
- Views/modifies file attributes
PID:1800
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c attrib -s -h c:\sendto.exe2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\system32\attrib.exeattrib -s -h c:\sendto.exe3⤵
- Views/modifies file attributes
PID:4152
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c extrac32 /E /Y /L c:\ c:\cab.cab2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\system32\extrac32.exeextrac32 /E /Y /L c:\ c:\cab.cab3⤵PID:3220
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c extract /E /Y /L c:\ c:\cab.cab2⤵
- Process spawned unexpected child process
PID:1624
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c attrib +s +h c:\setflag.exe2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\system32\attrib.exeattrib +s +h c:\setflag.exe3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:3156
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c attrib +s +h c:\sendto.exe2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\system32\attrib.exeattrib +s +h c:\sendto.exe3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4372
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187
Filesize471B
MD53800ef9fef580bac3b95642d30b7c143
SHA15cb8f564ebd86fde4099e2f81aa340973aa00139
SHA25682b657fd0b1ab41de338959155e9bae83210901d9f2dadcc93fd550be09c6a8e
SHA5121fba6902750a629a0e9eed5fd1e53743b5254d6596417c699dddbc0fb005e646ed99dc4a0d52c6cd2f07e91ca9cc1eebfaadcf24e4f52a5463f16e660f12ba09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187
Filesize412B
MD583a5d061fd204736c44fa3e49138e83e
SHA1ba809d8e05b2c89e34cfe42a746dd2f1e0b7d716
SHA256f88262fe0c2c54ec90aa078c722b38939a859b6d6176b5b2d42211f9e196f378
SHA51243762034fa5a74921058af0979ea43aca31b6377b7904d4a437d2a7476a4881787670ee971770ed7f320b0eeddfc53b475a620a874217f47b6615bb146962306
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\7BD4031E-280C-4AFA-B84E-4CD00BD83E63
Filesize177KB
MD5987567d7a7e384f5bf3843daeb65d417
SHA17b928a9f2ee202f8110a61c37bd7c587f0ed9c10
SHA2567c3b89e7f7bc8d04682e6403effa1ef3dc820d1659c6bded75e9b600d67c1810
SHA5129ee472e6daa1b5cbe923942c1a93950b2ef04f46d0e68d7d5649e26bd44db828a1697c13d660a82bbae12639db6e7a1b58720f219a4363e391973f6344659bfa
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres
Filesize2KB
MD530269e1c52b10d71b8f345218ba9c0bf
SHA1ca3058aa7b405d0ccd9b10d5f48e76fcf381c40f
SHA2567596ee2e166460677a8f67a8507e1c42fffd3d5ea674795b50fd31db64f2d963
SHA51229e67079cff4dce6ff0003d327e962f50fa0ee185056520ff22e4517f2917f0c20aba751dc97c41de6e44428b2a591351295246c5dcca085c186635ba9627110
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbres
Filesize2KB
MD58654dbd843a0c4531906e3dc008d5baa
SHA17b7e33d50a1c16c8e2891a7e65aa338d4daaf8a7
SHA256cc7b5ceeeb72dc4c2fec71c1f4e27d54f2d913d46c12274a3192739d9cd8e50f
SHA512a94c0b2c35940c83913d2943432ab7d023bc9b53412ab5cd7eed4962ec189e144668b589d95745d674776ded7956868febbe0a432cb9010ff714e2312b8d8892
-
Filesize
68KB
MD52bfe86ff5c4839475907298314cfac62
SHA1f7a3ec7c1a818cf8adfd13ac0f7a1fbe75fd9aa5
SHA256ed73cf8033e46df967a17405b51c2ed33713ec3e22f29fb65a497c4931cc86c6
SHA51250676dc42b7dc6af0ed420b92a4de5aca945b5ce655b122cc07f68678a2107acc67fc752527b5de2d928783bff64f391433ff4456239c789e9b4bfc1d94bf205
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize3KB
MD5c26c99136e6df7b21a76e3492cda82e8
SHA154c57448b272b8985aae4415f4ff2cd1451b6adb
SHA256bfb9e93018b040728e99658906243ac9d1b912e08c9d418db58b71d5584dde06
SHA512f4742471f211ce3ab65c97bb7c693f039727baf7cec69f5ff4f89921919135b4a6ee24652812874439146867e3c4d356d8cc054d3e61cc3204221d0ce7d20b6c
-
Filesize
20KB
MD556bafcef305ce46d847421edd6eec04b
SHA1e6e31dda260fee10b63c4dd297b433749ea7ac07
SHA2563c6d90fdf13ef66dd36631796cd50db01dfb8e2db5b472c45202513ab816f272
SHA512c78210f40daa6e2827d1280eaca5ae22cf036d20ff802826171cfdaf2b64a011f32c8689eec174d3375e197b240e4c92a2fb466b01c66a96e9276cd1de160e20
-
Filesize
32KB
MD5a4f9be8517afb4c5d9c63960a5faf258
SHA16d3300bfc43b191819f687df91bfbe2c6294d6bb
SHA25678b6db289832df709d17fd5c49359ddfb9cacaa8303cd77290427bac4c829ba2
SHA512c6c918bc91ed645553245cc640ed66882af264035732b8a8c2682f14a9c8f183c38837c1b3e62ca7d16e1560e6bc2a4273b41c9614a046752928c9a0c45ecb2e
-
Filesize
70KB
MD55a876443f36ca54efae1c723041435c0
SHA17ebd6188c3df725008209b7d24f914b2b3ce0a6c
SHA25602397a86f99f98f212adee047d25c56fa6644a3cf6058ddb0da0221d708f1ee9
SHA512a065a1ed747b8348c49c909e7186da584a3f01bca4652b154d5f7f88c4de15c5f0c03884db5cf33bca9035944cf5c7bc6983571301dd0fa4d7c298942887a149
-
Filesize
24KB
MD5072ca9f791665febeacda1be1e71a124
SHA120d6d75ef7e06c72b43a2e3be81f5ceab11a1a5a
SHA256692bfa3ca595a0ed57dd1d5fa6652332162c90ea0c9b8c9b32ddbebbec063f3d
SHA5123cd1c0727085dcc054b1c9111c934fef3473d57a91e1e247418a220e35c59e495282740621d6c9c01c86a39ad4e5c79d7d95dbd289e25f044cfad1f616d52290
-
Filesize
68KB
MD53f08a7010fe4ea32b210b7919448ada6
SHA1c7bc3bb8f78ef217b83c593542b5c4cf602746a2
SHA256506260a97f723ce79e3243b651dc8af1c3fcdbf72431be60b1a0afbab8d2dce9
SHA512be8ac3dcb6574e6876c2f8d2e40c1c6ad75ca611275ccc73c7283f6b17f3956c16c14d9dfa10e36576011baa691378a8ce6115e380b821a2d6f549ea46567b4c
-
Filesize
103KB
MD526ab77fe4d542805e0afdc9d0efc92c2
SHA1332dc776b13e8f04809a312183ef9532ea2b18d3
SHA2561cb2d969e56664ddc1f496c63e424cbe1ce2f560f8350f4ffa451f0fc03006d9
SHA512ef439dbbe390eb175bd9970d76827a6b506b88a4db7cda233d8b6591b22e3c7a454cbb8111ca78dbbd6b195c91aa89c7d0c9df952052d3471eb07ac80f98b89a