Analysis
-
max time kernel
101s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2025, 07:56
Behavioral task
behavioral1
Sample
JaffaCakes118_9a0180372314ddb8f59ef0924cedb72b.xls
Resource
win10v2004-20250313-en
General
-
Target
JaffaCakes118_9a0180372314ddb8f59ef0924cedb72b.xls
-
Size
114KB
-
MD5
9a0180372314ddb8f59ef0924cedb72b
-
SHA1
8222dc27e98dcd414a3adee4d19fba89d3d0adea
-
SHA256
3075c4eacfe14d7ae4ac56cc9d51dbdeba9247db8f1ca4f8c4106484d95b8b32
-
SHA512
3651a9aaa401de204472d49e420912f9cf83edcd680de4bfc9505eab982af0c86a12422fc4a7e4838f1dc35dd28c672e6b1f6d7198d8fc170da58651fd42306b
-
SSDEEP
1536:Ay4444091iavi37y4WFDSNiWhB4yajWMZZ95FaVy6rc/t1WVbrzQ7ITz1Qx2Gk0v:hMSrc/nWVbrzQ7ITz13n0PxWS
Malware Config
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 804 408 cmd.exe 84 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 5244 408 cmd.exe 84 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 5012 408 cmd.exe 84 -
resource yara_rule behavioral1/files/0x00030000000230f0-103.dat office_xlm_macros -
Deletes itself 1 IoCs
pid Process 408 EXCEL.EXE -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\5D875E00\:Zone.Identifier:$DATA EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 408 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 408 EXCEL.EXE 408 EXCEL.EXE 408 EXCEL.EXE 408 EXCEL.EXE 408 EXCEL.EXE 408 EXCEL.EXE 408 EXCEL.EXE 408 EXCEL.EXE 408 EXCEL.EXE 408 EXCEL.EXE 408 EXCEL.EXE 408 EXCEL.EXE 408 EXCEL.EXE 408 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 408 wrote to memory of 5012 408 EXCEL.EXE 92 PID 408 wrote to memory of 5012 408 EXCEL.EXE 92 PID 408 wrote to memory of 5244 408 EXCEL.EXE 93 PID 408 wrote to memory of 5244 408 EXCEL.EXE 93 PID 408 wrote to memory of 804 408 EXCEL.EXE 94 PID 408 wrote to memory of 804 408 EXCEL.EXE 94 PID 5012 wrote to memory of 4924 5012 cmd.exe 98 PID 5012 wrote to memory of 4924 5012 cmd.exe 98 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4924 attrib.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9a0180372314ddb8f59ef0924cedb72b.xls"1⤵
- Deletes itself
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\system32\attrib.exeattrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"3⤵
- Views/modifies file attributes
PID:4924
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
PID:5244
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c RD /S /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
PID:804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD50a4417013ce225f86ab071a004cca7cf
SHA1dbc64e9124dd384484c0fb1228fb13e1af5fa763
SHA25648c7c8b62d09170c073660d301e0595633c5d1cede797943e3c91b13feec11cd
SHA512a14ada0ac9cc116c58a47246062c0cdbe2664e1457967e84178b18dafcb4957a6df14b12265127e5b52b458438b663d7a460851a9af40e3ed1fb59fd679ce984
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize2KB
MD5772823031cab83d6150b532b384176e1
SHA12d60eb25da3320ca4a78bc5192eb88ee626ad54a
SHA2561b3521a1ef252338651391532ac4577e48a219915399d1a0413edeb72d77a07c
SHA512af5f95b035a24c6e6b01b1042a8c7d9fa09a82d9f2bfd830b0aa7eb88c3fa7b3f69b06fcaf14740bacb6e89bb1d256488f866a9b1698bf7c346511849edb852d