Analysis
-
max time kernel
103s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
07/04/2025, 07:03
Behavioral task
behavioral1
Sample
JaffaCakes118_9e4a61b13e22f6fb546a0aef9ba97d56.xls
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_9e4a61b13e22f6fb546a0aef9ba97d56.xls
-
Size
152KB
-
MD5
9e4a61b13e22f6fb546a0aef9ba97d56
-
SHA1
c8118cde2fab8eae7b951a9d8e7aff7b7308e400
-
SHA256
2408ecedd613c094834bd12c4c8834986c487f26042a27615be5f21883fc9d78
-
SHA512
47fa7d253ff8ccc005bf9119ff07dd8622178a9c4279c1817116211be20445abe3422eb25fdfa5f8200e692f8296f07d27ee848857f03b8ac3d50cc7ea284a94
-
SSDEEP
1536:Gl88wmvmNpxI3owOREITCzYPEXEZ95iHQged3pZDXVMUX254zAM/TE+2jcc0lbxC:4+d3Hhn2jcc0lbxOrJxJEXwMnCn
Malware Config
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2356 4476 cmd.exe 85 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 5512 4476 cmd.exe 85 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 516 4476 cmd.exe 85 -
resource yara_rule behavioral1/files/0x0008000000024257-105.dat office_xlm_macros -
Deletes itself 1 IoCs
pid Process 4476 EXCEL.EXE -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\73775E00\:Zone.Identifier:$DATA EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4476 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4476 EXCEL.EXE 4476 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 4476 EXCEL.EXE 4476 EXCEL.EXE 4476 EXCEL.EXE 4476 EXCEL.EXE 4476 EXCEL.EXE 4476 EXCEL.EXE 4476 EXCEL.EXE 4476 EXCEL.EXE 4476 EXCEL.EXE 4476 EXCEL.EXE 4476 EXCEL.EXE 4476 EXCEL.EXE 4476 EXCEL.EXE 4476 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4476 wrote to memory of 516 4476 EXCEL.EXE 91 PID 4476 wrote to memory of 516 4476 EXCEL.EXE 91 PID 4476 wrote to memory of 5512 4476 EXCEL.EXE 92 PID 4476 wrote to memory of 5512 4476 EXCEL.EXE 92 PID 4476 wrote to memory of 2356 4476 EXCEL.EXE 93 PID 4476 wrote to memory of 2356 4476 EXCEL.EXE 93 PID 516 wrote to memory of 2052 516 cmd.exe 97 PID 516 wrote to memory of 2052 516 cmd.exe 97 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2052 attrib.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9e4a61b13e22f6fb546a0aef9ba97d56.xls"1⤵
- Deletes itself
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Windows\system32\attrib.exeattrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"3⤵
- Views/modifies file attributes
PID:2052
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
PID:5512
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c RD /S /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
PID:2356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
177KB
MD577a1078adb27d2955f27577ebef98045
SHA1715d952a1dcbf778cb4e4811d4d0d84eaa607abf
SHA256acb1a74378da6b8ef9d3455630cb2cf8560c4f1b853e45b569d64aaf1fbea7f3
SHA512a1d6947bb75a063c8ed45ea16058b01bfde049105dd1d76106fab88fdfdf6713eeec40ed766aedfde51fe7a2ec812071a861ed667f4bc804505e1d360d9a6901
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5de1370cc7027489518db11de64a78a6e
SHA19884877151cdd6da000e0744b402f348fbeedb23
SHA256055baa89bc8385fbec79c001aa280bba269ca564b66eff03778ffd5855d1010f
SHA51202e0a8475fb4496530fd839786f7dea38143c8a8ec94a81088e7a79bd0441574666a61a68b37684288b4b9d3966685209a8a326ff06270232328203883735f75