Analysis

  • max time kernel
    133s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/03/2025, 13:02

General

  • Target

    JaffaCakes118_74571c140b996d8a24dae2517a182d25.xls

  • Size

    205KB

  • MD5

    74571c140b996d8a24dae2517a182d25

  • SHA1

    786b293d45773918b1fe8a8f9e355a4a4845fba8

  • SHA256

    b91ff4b652f1096186b85933e56c53847efad80c9b43cafda49c1dfda9e79ad7

  • SHA512

    15bddb8f5898e4fee3442fddff43d467bea06140e204bcff6e1ff681a207461cee925cc3e07ced5e6712b6d68361cc41fdfdb4804b2b9a29e357fe9ae80156b0

  • SSDEEP

    6144:7vnRVTVDkdysFe71ERKXKhU3TZaA472byRW1N8xXImuForwR+RXgf5xSl7ZXGJwi:zRVTVDkdysFe71ERKXKhU3TZaA472byZ

Malware Config

Signatures

  • Process spawned unexpected child process 3 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Suspicious Office macro 1 IoCs

    Office document equipped with 4.0 macros.

  • Deletes itself 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_74571c140b996d8a24dae2517a182d25.xls"
    1⤵
    • Deletes itself
    • Checks processor information in registry
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4028
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:5480
      • C:\Windows\system32\attrib.exe
        attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
        3⤵
        • Views/modifies file attributes
        PID:5544
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c Del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
      2⤵
      • Process spawned unexpected child process
      PID:4708
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c RD /S /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
      2⤵
      • Process spawned unexpected child process
      PID:4900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_74571c140b996d8a24dae2517a182d25.xls

    Filesize

    216KB

    MD5

    3616b1394fe8c44067b15c8935467aef

    SHA1

    2bfc07400681c88b0e2720778aeed2e0c0cce7ca

    SHA256

    dbca0805e1e32cf8cd05c7426e067ba54312c911a2691a32df99f72285aef298

    SHA512

    b55fff8423d60ad86ba2a234e160fc49107486cc61438db5adbd74218e00e16b62637ab83a851e8db5b8daaaa889c676b7009f111933b853053e2a1b0f3c24e6

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    677B

    MD5

    7ddf6be6b6944327411b1ec56ebb187a

    SHA1

    f4e32a0e4ccce301ab7567094f40721e2062101a

    SHA256

    a1aefb23e4dc5618472a377acec11f8a156054f7c06861ceebe55c2f70e04ffc

    SHA512

    7612acd6d02cd0ebdfa22729dd5515bf0fef072556970731118263411aef454e58bd942b3f17cc467a946d627134571f7b95dce00f79e1460d22337c3731d65f

  • memory/4028-7-0x00007FF81C970000-0x00007FF81CB65000-memory.dmp

    Filesize

    2.0MB

  • memory/4028-49-0x00007FF81C970000-0x00007FF81CB65000-memory.dmp

    Filesize

    2.0MB

  • memory/4028-6-0x00007FF81C970000-0x00007FF81CB65000-memory.dmp

    Filesize

    2.0MB

  • memory/4028-4-0x00007FF7DC9F0000-0x00007FF7DCA00000-memory.dmp

    Filesize

    64KB

  • memory/4028-9-0x00007FF81C970000-0x00007FF81CB65000-memory.dmp

    Filesize

    2.0MB

  • memory/4028-10-0x00007FF81C970000-0x00007FF81CB65000-memory.dmp

    Filesize

    2.0MB

  • memory/4028-13-0x00007FF81C970000-0x00007FF81CB65000-memory.dmp

    Filesize

    2.0MB

  • memory/4028-12-0x00007FF81C970000-0x00007FF81CB65000-memory.dmp

    Filesize

    2.0MB

  • memory/4028-14-0x00007FF81C970000-0x00007FF81CB65000-memory.dmp

    Filesize

    2.0MB

  • memory/4028-16-0x00007FF7DA0F0000-0x00007FF7DA100000-memory.dmp

    Filesize

    64KB

  • memory/4028-15-0x00007FF81C970000-0x00007FF81CB65000-memory.dmp

    Filesize

    2.0MB

  • memory/4028-11-0x00007FF81C970000-0x00007FF81CB65000-memory.dmp

    Filesize

    2.0MB

  • memory/4028-17-0x00007FF7DA0F0000-0x00007FF7DA100000-memory.dmp

    Filesize

    64KB

  • memory/4028-8-0x00007FF81C970000-0x00007FF81CB65000-memory.dmp

    Filesize

    2.0MB

  • memory/4028-1-0x00007FF7DC9F0000-0x00007FF7DCA00000-memory.dmp

    Filesize

    64KB

  • memory/4028-5-0x00007FF7DC9F0000-0x00007FF7DCA00000-memory.dmp

    Filesize

    64KB

  • memory/4028-3-0x00007FF7DC9F0000-0x00007FF7DCA00000-memory.dmp

    Filesize

    64KB

  • memory/4028-48-0x00007FF81C970000-0x00007FF81CB65000-memory.dmp

    Filesize

    2.0MB

  • memory/4028-50-0x00007FF81C970000-0x00007FF81CB65000-memory.dmp

    Filesize

    2.0MB

  • memory/4028-51-0x00007FF81C970000-0x00007FF81CB65000-memory.dmp

    Filesize

    2.0MB

  • memory/4028-52-0x00007FF81C970000-0x00007FF81CB65000-memory.dmp

    Filesize

    2.0MB

  • memory/4028-53-0x00007FF81C970000-0x00007FF81CB65000-memory.dmp

    Filesize

    2.0MB

  • memory/4028-58-0x00007FF81C970000-0x00007FF81CB65000-memory.dmp

    Filesize

    2.0MB

  • memory/4028-66-0x00007FF81C970000-0x00007FF81CB65000-memory.dmp

    Filesize

    2.0MB

  • memory/4028-67-0x00007FF81C970000-0x00007FF81CB65000-memory.dmp

    Filesize

    2.0MB

  • memory/4028-2-0x00007FF7DC9F0000-0x00007FF7DCA00000-memory.dmp

    Filesize

    64KB

  • memory/4028-100-0x00007FF81C970000-0x00007FF81CB65000-memory.dmp

    Filesize

    2.0MB

  • memory/4028-101-0x00007FF81CA0D000-0x00007FF81CA0E000-memory.dmp

    Filesize

    4KB

  • memory/4028-102-0x00007FF81C970000-0x00007FF81CB65000-memory.dmp

    Filesize

    2.0MB

  • memory/4028-103-0x00007FF81C970000-0x00007FF81CB65000-memory.dmp

    Filesize

    2.0MB

  • memory/4028-104-0x00007FF81C970000-0x00007FF81CB65000-memory.dmp

    Filesize

    2.0MB

  • memory/4028-105-0x00007FF81C970000-0x00007FF81CB65000-memory.dmp

    Filesize

    2.0MB

  • memory/4028-0-0x00007FF81CA0D000-0x00007FF81CA0E000-memory.dmp

    Filesize

    4KB