Analysis

  • max time kernel
    101s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/03/2025, 17:14

General

  • Target

    JaffaCakes118_8c7175edb5909213e438f867bdd4ae0e.xls

  • Size

    109KB

  • MD5

    8c7175edb5909213e438f867bdd4ae0e

  • SHA1

    19968aa160749d112825f72263fff76e5a94249b

  • SHA256

    0831b4c860508d4d4f3047d528675b8549bdd19d29d78a7e72245fc4aa2b6a95

  • SHA512

    1e3a33f9c0d4ad955a8e6e1c4f63afb3969ada92f2e5a430baa7cfd16d50d95e417679eaefbab27ed2396e5a88d6d8ef4a2fb190eb94e14d616047fa3bfdc741

  • SSDEEP

    1536:ipyyy2O3f9hXDlHrlrIeSU/+qMb2jcc0lbxOvTgZZ488ScJtXwPXS:iyhXl5rIea2jcc0lbxOrbjhJtXw/S

Malware Config

Signatures

  • Process spawned unexpected child process 3 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Suspicious Office macro 1 IoCs

    Office document equipped with 4.0 macros.

  • Deletes itself 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8c7175edb5909213e438f867bdd4ae0e.xls"
    1⤵
    • Deletes itself
    • Checks processor information in registry
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:840
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:4372
      • C:\Windows\system32\attrib.exe
        attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
        3⤵
        • Views/modifies file attributes
        PID:1436
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c Del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
      2⤵
      • Process spawned unexpected child process
      PID:4904
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c RD /S /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
      2⤵
      • Process spawned unexpected child process
      PID:4772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8c7175edb5909213e438f867bdd4ae0e.xls

    Filesize

    144KB

    MD5

    f9e9588c08d647aa2f4fcfcfa6943966

    SHA1

    d78ce2718cacd50de8ea9b54f2b2e31ffc122c7d

    SHA256

    355c168d667a6352e3ee13edb70e236bab72715d7639c732d6b8502f03be5ea4

    SHA512

    aaefda8473960c0c4ad3726f7b8b084f7954df27a2bd2310bf73e2990f3e8f3529c332f18f8fb2f55f6ce3316e7b26158fcce2f0efa668a1158b2ae7b933531c

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    1c4929bc7b44d6e4c6134a5b9cb38eec

    SHA1

    3bca767d4bb321425b8309d76e510b578c3556d2

    SHA256

    0f9130dc104037b88f7b1e2dad2a5350bd77e80b04c8229f37cfe67c7ca2e395

    SHA512

    50e0d04b056fce97f9488b3b05c997d45685824a7205b52ff61a8e796253f2302b2d0988ad2e1a30c40b55de8b68fdd15a0239f71c1d9c14056b7268a70d56c6

  • memory/840-58-0x00007FFB9CA70000-0x00007FFB9CC65000-memory.dmp

    Filesize

    2.0MB

  • memory/840-60-0x00007FFB9CA70000-0x00007FFB9CC65000-memory.dmp

    Filesize

    2.0MB

  • memory/840-2-0x00007FFB5CAF0000-0x00007FFB5CB00000-memory.dmp

    Filesize

    64KB

  • memory/840-1-0x00007FFB9CB0D000-0x00007FFB9CB0E000-memory.dmp

    Filesize

    4KB

  • memory/840-6-0x00007FFB9CA70000-0x00007FFB9CC65000-memory.dmp

    Filesize

    2.0MB

  • memory/840-8-0x00007FFB9CA70000-0x00007FFB9CC65000-memory.dmp

    Filesize

    2.0MB

  • memory/840-10-0x00007FFB9CA70000-0x00007FFB9CC65000-memory.dmp

    Filesize

    2.0MB

  • memory/840-9-0x00007FFB9CA70000-0x00007FFB9CC65000-memory.dmp

    Filesize

    2.0MB

  • memory/840-7-0x00007FFB9CA70000-0x00007FFB9CC65000-memory.dmp

    Filesize

    2.0MB

  • memory/840-59-0x00007FFB9CA70000-0x00007FFB9CC65000-memory.dmp

    Filesize

    2.0MB

  • memory/840-12-0x00007FFB9CA70000-0x00007FFB9CC65000-memory.dmp

    Filesize

    2.0MB

  • memory/840-13-0x00007FFB5A190000-0x00007FFB5A1A0000-memory.dmp

    Filesize

    64KB

  • memory/840-14-0x00007FFB9CA70000-0x00007FFB9CC65000-memory.dmp

    Filesize

    2.0MB

  • memory/840-17-0x00007FFB9CA70000-0x00007FFB9CC65000-memory.dmp

    Filesize

    2.0MB

  • memory/840-16-0x00007FFB9CA70000-0x00007FFB9CC65000-memory.dmp

    Filesize

    2.0MB

  • memory/840-19-0x00007FFB9CA70000-0x00007FFB9CC65000-memory.dmp

    Filesize

    2.0MB

  • memory/840-18-0x00007FFB9CA70000-0x00007FFB9CC65000-memory.dmp

    Filesize

    2.0MB

  • memory/840-15-0x00007FFB9CA70000-0x00007FFB9CC65000-memory.dmp

    Filesize

    2.0MB

  • memory/840-3-0x00007FFB5CAF0000-0x00007FFB5CB00000-memory.dmp

    Filesize

    64KB

  • memory/840-0-0x00007FFB5CAF0000-0x00007FFB5CB00000-memory.dmp

    Filesize

    64KB

  • memory/840-11-0x00007FFB5A190000-0x00007FFB5A1A0000-memory.dmp

    Filesize

    64KB

  • memory/840-62-0x00007FFB9CA70000-0x00007FFB9CC65000-memory.dmp

    Filesize

    2.0MB

  • memory/840-57-0x00007FFB9CA70000-0x00007FFB9CC65000-memory.dmp

    Filesize

    2.0MB

  • memory/840-53-0x00007FFB9CA70000-0x00007FFB9CC65000-memory.dmp

    Filesize

    2.0MB

  • memory/840-5-0x00007FFB5CAF0000-0x00007FFB5CB00000-memory.dmp

    Filesize

    64KB

  • memory/840-105-0x00007FFB9CB0D000-0x00007FFB9CB0E000-memory.dmp

    Filesize

    4KB

  • memory/840-106-0x00007FFB9CA70000-0x00007FFB9CC65000-memory.dmp

    Filesize

    2.0MB

  • memory/840-107-0x00007FFB9CA70000-0x00007FFB9CC65000-memory.dmp

    Filesize

    2.0MB

  • memory/840-108-0x00007FFB9CA70000-0x00007FFB9CC65000-memory.dmp

    Filesize

    2.0MB

  • memory/840-109-0x00007FFB9CA70000-0x00007FFB9CC65000-memory.dmp

    Filesize

    2.0MB

  • memory/840-110-0x00007FFB9CA70000-0x00007FFB9CC65000-memory.dmp

    Filesize

    2.0MB

  • memory/840-111-0x00007FFB9CA70000-0x00007FFB9CC65000-memory.dmp

    Filesize

    2.0MB

  • memory/840-4-0x00007FFB5CAF0000-0x00007FFB5CB00000-memory.dmp

    Filesize

    64KB

  • memory/840-134-0x00007FFB5CAF0000-0x00007FFB5CB00000-memory.dmp

    Filesize

    64KB

  • memory/840-136-0x00007FFB5CAF0000-0x00007FFB5CB00000-memory.dmp

    Filesize

    64KB

  • memory/840-135-0x00007FFB5CAF0000-0x00007FFB5CB00000-memory.dmp

    Filesize

    64KB

  • memory/840-133-0x00007FFB5CAF0000-0x00007FFB5CB00000-memory.dmp

    Filesize

    64KB

  • memory/840-137-0x00007FFB9CA70000-0x00007FFB9CC65000-memory.dmp

    Filesize

    2.0MB