Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
101s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2024, 17:11
Static task
static1
Behavioral task
behavioral1
Sample
27dabbb4eaf2447b5b0e5276aa233ba8_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
27dabbb4eaf2447b5b0e5276aa233ba8_JaffaCakes118.doc
Resource
win10v2004-20240319-en
Behavioral task
behavioral3
Sample
decrypted.xlsx
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
decrypted.xlsx
Resource
win10v2004-20240226-en
General
-
Target
decrypted.xlsx
-
Size
586KB
-
MD5
5c3b38135d6af0c13edd2a4ab56e3fee
-
SHA1
05b415b0b93195838258acba1c5431eff79ff12a
-
SHA256
8f6bd28a507af02d43cf0e29d9b213e9b5a938ad2c314097ad4fbaca1d986256
-
SHA512
f3bd952e0749616e1d764f0254573fad16353531e780bf5f9e87219a97d9fbd025f221466bc2cf83b962d63aa121f93b2cbf7c4bede930b3001457dfdde21ef3
-
SSDEEP
12288:VQdrtkaEfAJoa+0zl/SqwbRXbnumIYSDZX9tra0JOrMGZ5NtSdZ1:aNuaEIJoa+3nb7E9w0Js1TSdZ1
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4292 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4292 EXCEL.EXE 4292 EXCEL.EXE 4292 EXCEL.EXE 4292 EXCEL.EXE 4292 EXCEL.EXE 4292 EXCEL.EXE 4292 EXCEL.EXE 4292 EXCEL.EXE 4292 EXCEL.EXE 4292 EXCEL.EXE 4292 EXCEL.EXE 4292 EXCEL.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\decrypted.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4292