Analysis
-
max time kernel
133s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2025, 18:12
Behavioral task
behavioral1
Sample
JaffaCakes118_6c855fa474e62d6f1856db1ad5e8e095.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6c855fa474e62d6f1856db1ad5e8e095.xls
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_6c855fa474e62d6f1856db1ad5e8e095.xls
-
Size
132KB
-
MD5
6c855fa474e62d6f1856db1ad5e8e095
-
SHA1
9807ff0ca2cd9c9b5ae1de7afd2934226005e201
-
SHA256
bcc6271fbd159bf8ad8fcff4d49663dc3439a571ac4962b7d7eef0bf136c226f
-
SHA512
02da8ec45713588bdb48988983c4dfb59148d1e05ccd7bb714f54d44d36f8114e892b96bccdf6e51eceebc91ca6dee5e530dd06ad627c4be27fb3f97923cde0c
-
SSDEEP
3072:CXTzzbYb6nhTWVbrzQ7ITkDZTJtXwPTv4:QTvbYb6nhf
Malware Config
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4232 2304 cmd.exe 83 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4128 2304 cmd.exe 83 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 64 2304 cmd.exe 83 -
resource yara_rule behavioral2/files/0x000400000001e6df-107.dat office_xlm_macros -
Deletes itself 1 IoCs
pid Process 2304 EXCEL.EXE -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\17A75E00\:Zone.Identifier:$DATA EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2304 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 2304 EXCEL.EXE 2304 EXCEL.EXE 2304 EXCEL.EXE 2304 EXCEL.EXE 2304 EXCEL.EXE 2304 EXCEL.EXE 2304 EXCEL.EXE 2304 EXCEL.EXE 2304 EXCEL.EXE 2304 EXCEL.EXE 2304 EXCEL.EXE 2304 EXCEL.EXE 2304 EXCEL.EXE 2304 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2304 wrote to memory of 4232 2304 EXCEL.EXE 88 PID 2304 wrote to memory of 4232 2304 EXCEL.EXE 88 PID 2304 wrote to memory of 64 2304 EXCEL.EXE 89 PID 2304 wrote to memory of 64 2304 EXCEL.EXE 89 PID 2304 wrote to memory of 4128 2304 EXCEL.EXE 90 PID 2304 wrote to memory of 4128 2304 EXCEL.EXE 90 PID 4232 wrote to memory of 1064 4232 cmd.exe 95 PID 4232 wrote to memory of 1064 4232 cmd.exe 95 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1064 attrib.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6c855fa474e62d6f1856db1ad5e8e095.xls"1⤵
- Deletes itself
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\system32\attrib.exeattrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"3⤵
- Views/modifies file attributes
PID:1064
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
PID:64
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c RD /S /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
PID:4128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150KB
MD58895bdc173ed77733d25ebb2d8241509
SHA1a4a3c5164f4cc05e79b7664b684dc9785a98291a
SHA256d251bf324ede07dbe8254518933bbcaedd0da9166e813c0a66da329bf803e5c6
SHA5128ad9c8849413a5b5d0933cae8f0b27989ca3a48cfafb818ebd19b7ba6e800c9011f7cc2875b0b2a3939956ae858ffd042f1ff5877c02aee1f59a164ee93db86f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD51efee254a45f0ef72a1ab179208f4f5c
SHA1593e1fe892e3d1f9130d303acc7cf4295140e579
SHA2565ae431c5ea8a1dabc358b1339f66f6e9c6f1f25808592a854a3dd8206e40965f
SHA512270ea97fbda56bf08c258864e8bb606388b380fdddc8255a177acb612490722801e6f094baad58ab6a85cfca4af23890315656d662ce60609c3ff94fed320c8b