Analysis

  • max time kernel
    101s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/04/2025, 07:56

General

  • Target

    JaffaCakes118_9a0180372314ddb8f59ef0924cedb72b.xls

  • Size

    114KB

  • MD5

    9a0180372314ddb8f59ef0924cedb72b

  • SHA1

    8222dc27e98dcd414a3adee4d19fba89d3d0adea

  • SHA256

    3075c4eacfe14d7ae4ac56cc9d51dbdeba9247db8f1ca4f8c4106484d95b8b32

  • SHA512

    3651a9aaa401de204472d49e420912f9cf83edcd680de4bfc9505eab982af0c86a12422fc4a7e4838f1dc35dd28c672e6b1f6d7198d8fc170da58651fd42306b

  • SSDEEP

    1536:Ay4444091iavi37y4WFDSNiWhB4yajWMZZ95FaVy6rc/t1WVbrzQ7ITz1Qx2Gk0v:hMSrc/nWVbrzQ7ITz13n0PxWS

Malware Config

Signatures

  • Process spawned unexpected child process 3 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Suspicious Office macro 1 IoCs

    Office document equipped with 4.0 macros.

  • Deletes itself 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9a0180372314ddb8f59ef0924cedb72b.xls"
    1⤵
    • Deletes itself
    • Checks processor information in registry
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:408
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:5012
      • C:\Windows\system32\attrib.exe
        attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
        3⤵
        • Views/modifies file attributes
        PID:4924
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c Del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
      2⤵
      • Process spawned unexpected child process
      PID:5244
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c RD /S /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"
      2⤵
      • Process spawned unexpected child process
      PID:804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9a0180372314ddb8f59ef0924cedb72b.xls

    Filesize

    134KB

    MD5

    0a4417013ce225f86ab071a004cca7cf

    SHA1

    dbc64e9124dd384484c0fb1228fb13e1af5fa763

    SHA256

    48c7c8b62d09170c073660d301e0595633c5d1cede797943e3c91b13feec11cd

    SHA512

    a14ada0ac9cc116c58a47246062c0cdbe2664e1457967e84178b18dafcb4957a6df14b12265127e5b52b458438b663d7a460851a9af40e3ed1fb59fd679ce984

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    2KB

    MD5

    772823031cab83d6150b532b384176e1

    SHA1

    2d60eb25da3320ca4a78bc5192eb88ee626ad54a

    SHA256

    1b3521a1ef252338651391532ac4577e48a219915399d1a0413edeb72d77a07c

    SHA512

    af5f95b035a24c6e6b01b1042a8c7d9fa09a82d9f2bfd830b0aa7eb88c3fa7b3f69b06fcaf14740bacb6e89bb1d256488f866a9b1698bf7c346511849edb852d

  • memory/408-6-0x00007FFCFF7B0000-0x00007FFCFF7C0000-memory.dmp

    Filesize

    64KB

  • memory/408-43-0x00007FFD3F730000-0x00007FFD3F925000-memory.dmp

    Filesize

    2.0MB

  • memory/408-2-0x00007FFCFF7B0000-0x00007FFCFF7C0000-memory.dmp

    Filesize

    64KB

  • memory/408-5-0x00007FFD3F730000-0x00007FFD3F925000-memory.dmp

    Filesize

    2.0MB

  • memory/408-7-0x00007FFD3F730000-0x00007FFD3F925000-memory.dmp

    Filesize

    2.0MB

  • memory/408-10-0x00007FFD3F730000-0x00007FFD3F925000-memory.dmp

    Filesize

    2.0MB

  • memory/408-13-0x00007FFD3F730000-0x00007FFD3F925000-memory.dmp

    Filesize

    2.0MB

  • memory/408-12-0x00007FFD3F730000-0x00007FFD3F925000-memory.dmp

    Filesize

    2.0MB

  • memory/408-14-0x00007FFCFD440000-0x00007FFCFD450000-memory.dmp

    Filesize

    64KB

  • memory/408-59-0x00007FFD3F730000-0x00007FFD3F925000-memory.dmp

    Filesize

    2.0MB

  • memory/408-15-0x00007FFCFD440000-0x00007FFCFD450000-memory.dmp

    Filesize

    64KB

  • memory/408-16-0x00007FFD3F730000-0x00007FFD3F925000-memory.dmp

    Filesize

    2.0MB

  • memory/408-18-0x00007FFD3F730000-0x00007FFD3F925000-memory.dmp

    Filesize

    2.0MB

  • memory/408-20-0x00007FFD3F730000-0x00007FFD3F925000-memory.dmp

    Filesize

    2.0MB

  • memory/408-19-0x00007FFD3F730000-0x00007FFD3F925000-memory.dmp

    Filesize

    2.0MB

  • memory/408-17-0x00007FFD3F730000-0x00007FFD3F925000-memory.dmp

    Filesize

    2.0MB

  • memory/408-9-0x00007FFD3F730000-0x00007FFD3F925000-memory.dmp

    Filesize

    2.0MB

  • memory/408-8-0x00007FFD3F730000-0x00007FFD3F925000-memory.dmp

    Filesize

    2.0MB

  • memory/408-1-0x00007FFCFF7B0000-0x00007FFCFF7C0000-memory.dmp

    Filesize

    64KB

  • memory/408-0-0x00007FFCFF7B0000-0x00007FFCFF7C0000-memory.dmp

    Filesize

    64KB

  • memory/408-11-0x00007FFD3F730000-0x00007FFD3F925000-memory.dmp

    Filesize

    2.0MB

  • memory/408-58-0x00007FFD3F730000-0x00007FFD3F925000-memory.dmp

    Filesize

    2.0MB

  • memory/408-60-0x00007FFD3F730000-0x00007FFD3F925000-memory.dmp

    Filesize

    2.0MB

  • memory/408-51-0x00007FFD3F730000-0x00007FFD3F925000-memory.dmp

    Filesize

    2.0MB

  • memory/408-49-0x00007FFD3F730000-0x00007FFD3F925000-memory.dmp

    Filesize

    2.0MB

  • memory/408-72-0x00007FFD3F730000-0x00007FFD3F925000-memory.dmp

    Filesize

    2.0MB

  • memory/408-3-0x00007FFD3F7CD000-0x00007FFD3F7CE000-memory.dmp

    Filesize

    4KB

  • memory/408-105-0x00007FFD3F730000-0x00007FFD3F925000-memory.dmp

    Filesize

    2.0MB

  • memory/408-106-0x00007FFD3F730000-0x00007FFD3F925000-memory.dmp

    Filesize

    2.0MB

  • memory/408-107-0x00007FFD3F730000-0x00007FFD3F925000-memory.dmp

    Filesize

    2.0MB

  • memory/408-108-0x00007FFD3F730000-0x00007FFD3F925000-memory.dmp

    Filesize

    2.0MB

  • memory/408-109-0x00007FFD3F730000-0x00007FFD3F925000-memory.dmp

    Filesize

    2.0MB

  • memory/408-4-0x00007FFCFF7B0000-0x00007FFCFF7C0000-memory.dmp

    Filesize

    64KB

  • memory/408-131-0x00007FFCFF7B0000-0x00007FFCFF7C0000-memory.dmp

    Filesize

    64KB

  • memory/408-132-0x00007FFCFF7B0000-0x00007FFCFF7C0000-memory.dmp

    Filesize

    64KB

  • memory/408-134-0x00007FFCFF7B0000-0x00007FFCFF7C0000-memory.dmp

    Filesize

    64KB

  • memory/408-133-0x00007FFCFF7B0000-0x00007FFCFF7C0000-memory.dmp

    Filesize

    64KB

  • memory/408-135-0x00007FFD3F730000-0x00007FFD3F925000-memory.dmp

    Filesize

    2.0MB