Analysis
-
max time kernel
61s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
14/03/2025, 13:02
Behavioral task
behavioral1
Sample
JaffaCakes118_74571c140b996d8a24dae2517a182d25.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_74571c140b996d8a24dae2517a182d25.xls
Resource
win10v2004-20250313-en
General
-
Target
JaffaCakes118_74571c140b996d8a24dae2517a182d25.xls
-
Size
205KB
-
MD5
74571c140b996d8a24dae2517a182d25
-
SHA1
786b293d45773918b1fe8a8f9e355a4a4845fba8
-
SHA256
b91ff4b652f1096186b85933e56c53847efad80c9b43cafda49c1dfda9e79ad7
-
SHA512
15bddb8f5898e4fee3442fddff43d467bea06140e204bcff6e1ff681a207461cee925cc3e07ced5e6712b6d68361cc41fdfdb4804b2b9a29e357fe9ae80156b0
-
SSDEEP
6144:7vnRVTVDkdysFe71ERKXKhU3TZaA472byRW1N8xXImuForwR+RXgf5xSl7ZXGJwi:zRVTVDkdysFe71ERKXKhU3TZaA472byZ
Malware Config
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1692 2604 cmd.exe 28 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1760 2604 cmd.exe 28 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2288 2604 cmd.exe 28 -
Deletes itself 1 IoCs
pid Process 2604 EXCEL.EXE -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Office loads VBA resources, possible macro or embedded object present
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\3D187F00\:Zone.Identifier:$DATA EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2604 EXCEL.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2604 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2604 EXCEL.EXE 2604 EXCEL.EXE 2604 EXCEL.EXE 2604 EXCEL.EXE 2604 EXCEL.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2288 2604 EXCEL.EXE 29 PID 2604 wrote to memory of 2288 2604 EXCEL.EXE 29 PID 2604 wrote to memory of 2288 2604 EXCEL.EXE 29 PID 2604 wrote to memory of 2288 2604 EXCEL.EXE 29 PID 2604 wrote to memory of 1760 2604 EXCEL.EXE 30 PID 2604 wrote to memory of 1760 2604 EXCEL.EXE 30 PID 2604 wrote to memory of 1760 2604 EXCEL.EXE 30 PID 2604 wrote to memory of 1760 2604 EXCEL.EXE 30 PID 2604 wrote to memory of 1692 2604 EXCEL.EXE 31 PID 2604 wrote to memory of 1692 2604 EXCEL.EXE 31 PID 2604 wrote to memory of 1692 2604 EXCEL.EXE 31 PID 2604 wrote to memory of 1692 2604 EXCEL.EXE 31 PID 2288 wrote to memory of 1324 2288 cmd.exe 35 PID 2288 wrote to memory of 1324 2288 cmd.exe 35 PID 2288 wrote to memory of 1324 2288 cmd.exe 35 PID 2288 wrote to memory of 1324 2288 cmd.exe 35 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1324 attrib.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_74571c140b996d8a24dae2517a182d25.xls1⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\attrib.exeattrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1324
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:1760
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c RD /S /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:1692
-