Analysis

  • max time kernel
    103s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/03/2025, 17:31

General

  • Target

    JaffaCakes118_8da93f2c184247b886fee3ac1b17eb58.xls

  • Size

    95KB

  • MD5

    8da93f2c184247b886fee3ac1b17eb58

  • SHA1

    d6e6cf2946c657f222501453d20fd86766545783

  • SHA256

    ba8990f92dd9680634d898be9d5a63ec42d89660a1f29a51147633307b1e9da5

  • SHA512

    38d62103fb0bc336e7870e9e8b16968c5a6e524ecf13bc3455936102779edeec337ede1d01f6e9dfa6ee2abfa1214c5c338ca54ac63ac6687e23b7007b653d77

  • SSDEEP

    1536:eeeeeqWfeOQzJtV8cbsQvPe8k1SLz459mYqNAOIbkWVbrzQ7ITkPBx2sKt8pcJtk:eExWVbrzQ7ITky18CJtXweQN

Malware Config

Signatures

  • Process spawned unexpected child process 3 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Suspicious Office macro 1 IoCs

    Office document equipped with 4.0 macros.

  • Deletes itself 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8da93f2c184247b886fee3ac1b17eb58.xls"
    1⤵
    • Deletes itself
    • Checks processor information in registry
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4356
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:1060
      • C:\Windows\system32\attrib.exe
        attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
        3⤵
        • Views/modifies file attributes
        PID:2656
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c Del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
      2⤵
      • Process spawned unexpected child process
      PID:1572
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c RD /S /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
      2⤵
      • Process spawned unexpected child process
      PID:1704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8da93f2c184247b886fee3ac1b17eb58.xls

    Filesize

    115KB

    MD5

    e44129631c790020f45b6407e0cdcf85

    SHA1

    78fdaf3be3b8187b53be212594abd0e4ac5cbfab

    SHA256

    2f156a0a96eb671126697d0a80fc408b28e4e22f6ea18e6d9b6f89b6288786b4

    SHA512

    3924f5afd0383877c44ce3a7f6feaf6e866fc35fbd889f60fba86adccdefa075ac2ff58020bc00e1bfdde9462d16c63fe0c71e9db0b9574d58e05896a40d4ef5

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    b2cadf2c7da0fd0ec9fc2eaba29eae9e

    SHA1

    b9280081be3a735ff287b3fee1fcc898ac10fc74

    SHA256

    8a776b83d794ff38b493c03d1b61344f4c4c6c329b7efe4f98ed95be61bedba1

    SHA512

    6ad79fc941400865576af26a33fba43d4f007b982643b270f76cd07864ce5b5828ed77d06ddcace2024267819eb10e7da438254ea34598d478c9a9f913871e44

  • memory/4356-58-0x00007FFAFE990000-0x00007FFAFEB85000-memory.dmp

    Filesize

    2.0MB

  • memory/4356-53-0x00007FFAFE990000-0x00007FFAFEB85000-memory.dmp

    Filesize

    2.0MB

  • memory/4356-2-0x00007FFABEA10000-0x00007FFABEA20000-memory.dmp

    Filesize

    64KB

  • memory/4356-5-0x00007FFABEA10000-0x00007FFABEA20000-memory.dmp

    Filesize

    64KB

  • memory/4356-9-0x00007FFAFE990000-0x00007FFAFEB85000-memory.dmp

    Filesize

    2.0MB

  • memory/4356-10-0x00007FFAFE990000-0x00007FFAFEB85000-memory.dmp

    Filesize

    2.0MB

  • memory/4356-8-0x00007FFAFE990000-0x00007FFAFEB85000-memory.dmp

    Filesize

    2.0MB

  • memory/4356-12-0x00007FFAFE990000-0x00007FFAFEB85000-memory.dmp

    Filesize

    2.0MB

  • memory/4356-11-0x00007FFAFE990000-0x00007FFAFEB85000-memory.dmp

    Filesize

    2.0MB

  • memory/4356-44-0x00007FFAFE990000-0x00007FFAFEB85000-memory.dmp

    Filesize

    2.0MB

  • memory/4356-7-0x00007FFAFE990000-0x00007FFAFEB85000-memory.dmp

    Filesize

    2.0MB

  • memory/4356-6-0x00007FFAFE990000-0x00007FFAFEB85000-memory.dmp

    Filesize

    2.0MB

  • memory/4356-14-0x00007FFABC0E0000-0x00007FFABC0F0000-memory.dmp

    Filesize

    64KB

  • memory/4356-15-0x00007FFABC0E0000-0x00007FFABC0F0000-memory.dmp

    Filesize

    64KB

  • memory/4356-34-0x00007FFAFE990000-0x00007FFAFEB85000-memory.dmp

    Filesize

    2.0MB

  • memory/4356-55-0x00007FFAFE990000-0x00007FFAFEB85000-memory.dmp

    Filesize

    2.0MB

  • memory/4356-56-0x00007FFAFE990000-0x00007FFAFEB85000-memory.dmp

    Filesize

    2.0MB

  • memory/4356-57-0x00007FFAFE990000-0x00007FFAFEB85000-memory.dmp

    Filesize

    2.0MB

  • memory/4356-4-0x00007FFABEA10000-0x00007FFABEA20000-memory.dmp

    Filesize

    64KB

  • memory/4356-1-0x00007FFAFEA2D000-0x00007FFAFEA2E000-memory.dmp

    Filesize

    4KB

  • memory/4356-13-0x00007FFAFE990000-0x00007FFAFEB85000-memory.dmp

    Filesize

    2.0MB

  • memory/4356-46-0x00007FFAFE990000-0x00007FFAFEB85000-memory.dmp

    Filesize

    2.0MB

  • memory/4356-63-0x00007FFAFE990000-0x00007FFAFEB85000-memory.dmp

    Filesize

    2.0MB

  • memory/4356-3-0x00007FFABEA10000-0x00007FFABEA20000-memory.dmp

    Filesize

    64KB

  • memory/4356-103-0x00007FFAFE990000-0x00007FFAFEB85000-memory.dmp

    Filesize

    2.0MB

  • memory/4356-104-0x00007FFAFEA2D000-0x00007FFAFEA2E000-memory.dmp

    Filesize

    4KB

  • memory/4356-105-0x00007FFAFE990000-0x00007FFAFEB85000-memory.dmp

    Filesize

    2.0MB

  • memory/4356-106-0x00007FFAFE990000-0x00007FFAFEB85000-memory.dmp

    Filesize

    2.0MB

  • memory/4356-107-0x00007FFAFE990000-0x00007FFAFEB85000-memory.dmp

    Filesize

    2.0MB

  • memory/4356-108-0x00007FFAFE990000-0x00007FFAFEB85000-memory.dmp

    Filesize

    2.0MB

  • memory/4356-109-0x00007FFAFE990000-0x00007FFAFEB85000-memory.dmp

    Filesize

    2.0MB

  • memory/4356-110-0x00007FFAFE990000-0x00007FFAFEB85000-memory.dmp

    Filesize

    2.0MB

  • memory/4356-0-0x00007FFABEA10000-0x00007FFABEA20000-memory.dmp

    Filesize

    64KB

  • memory/4356-133-0x00007FFABEA10000-0x00007FFABEA20000-memory.dmp

    Filesize

    64KB

  • memory/4356-134-0x00007FFABEA10000-0x00007FFABEA20000-memory.dmp

    Filesize

    64KB

  • memory/4356-136-0x00007FFABEA10000-0x00007FFABEA20000-memory.dmp

    Filesize

    64KB

  • memory/4356-135-0x00007FFABEA10000-0x00007FFABEA20000-memory.dmp

    Filesize

    64KB

  • memory/4356-137-0x00007FFAFE990000-0x00007FFAFEB85000-memory.dmp

    Filesize

    2.0MB