Analysis
-
max time kernel
101s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2025, 17:14
Behavioral task
behavioral1
Sample
JaffaCakes118_8c7175edb5909213e438f867bdd4ae0e.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8c7175edb5909213e438f867bdd4ae0e.xls
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_8c7175edb5909213e438f867bdd4ae0e.xls
-
Size
109KB
-
MD5
8c7175edb5909213e438f867bdd4ae0e
-
SHA1
19968aa160749d112825f72263fff76e5a94249b
-
SHA256
0831b4c860508d4d4f3047d528675b8549bdd19d29d78a7e72245fc4aa2b6a95
-
SHA512
1e3a33f9c0d4ad955a8e6e1c4f63afb3969ada92f2e5a430baa7cfd16d50d95e417679eaefbab27ed2396e5a88d6d8ef4a2fb190eb94e14d616047fa3bfdc741
-
SSDEEP
1536:ipyyy2O3f9hXDlHrlrIeSU/+qMb2jcc0lbxOvTgZZ488ScJtXwPXS:iyhXl5rIea2jcc0lbxOrbjhJtXw/S
Malware Config
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4772 840 cmd.exe 86 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4904 840 cmd.exe 86 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4372 840 cmd.exe 86 -
resource yara_rule behavioral2/files/0x00060000000229fb-103.dat office_xlm_macros -
Deletes itself 1 IoCs
pid Process 840 EXCEL.EXE -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\8D875E00\:Zone.Identifier:$DATA EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 840 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 840 EXCEL.EXE 840 EXCEL.EXE 840 EXCEL.EXE 840 EXCEL.EXE 840 EXCEL.EXE 840 EXCEL.EXE 840 EXCEL.EXE 840 EXCEL.EXE 840 EXCEL.EXE 840 EXCEL.EXE 840 EXCEL.EXE 840 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 840 wrote to memory of 4372 840 EXCEL.EXE 92 PID 840 wrote to memory of 4372 840 EXCEL.EXE 92 PID 840 wrote to memory of 4904 840 EXCEL.EXE 93 PID 840 wrote to memory of 4904 840 EXCEL.EXE 93 PID 840 wrote to memory of 4772 840 EXCEL.EXE 94 PID 840 wrote to memory of 4772 840 EXCEL.EXE 94 PID 4372 wrote to memory of 1436 4372 cmd.exe 98 PID 4372 wrote to memory of 1436 4372 cmd.exe 98 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1436 attrib.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8c7175edb5909213e438f867bdd4ae0e.xls"1⤵
- Deletes itself
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\system32\attrib.exeattrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"3⤵
- Views/modifies file attributes
PID:1436
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
PID:4904
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c RD /S /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
PID:4772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144KB
MD5f9e9588c08d647aa2f4fcfcfa6943966
SHA1d78ce2718cacd50de8ea9b54f2b2e31ffc122c7d
SHA256355c168d667a6352e3ee13edb70e236bab72715d7639c732d6b8502f03be5ea4
SHA512aaefda8473960c0c4ad3726f7b8b084f7954df27a2bd2310bf73e2990f3e8f3529c332f18f8fb2f55f6ce3316e7b26158fcce2f0efa668a1158b2ae7b933531c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD51c4929bc7b44d6e4c6134a5b9cb38eec
SHA13bca767d4bb321425b8309d76e510b578c3556d2
SHA2560f9130dc104037b88f7b1e2dad2a5350bd77e80b04c8229f37cfe67c7ca2e395
SHA51250e0d04b056fce97f9488b3b05c997d45685824a7205b52ff61a8e796253f2302b2d0988ad2e1a30c40b55de8b68fdd15a0239f71c1d9c14056b7268a70d56c6