Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 07:37
Behavioral task
behavioral1
Sample
5de5205fa99898550915140e774cfb31_JaffaCakes118.xlsm
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5de5205fa99898550915140e774cfb31_JaffaCakes118.xlsm
Resource
win10v2004-20240508-en
General
-
Target
5de5205fa99898550915140e774cfb31_JaffaCakes118.xlsm
-
Size
1.9MB
-
MD5
5de5205fa99898550915140e774cfb31
-
SHA1
42323ed30cee57d1102014e54bd1ae0dba35b8f2
-
SHA256
129ca77b2ff975862506a5470d5547b49b48141975bd7c2847793369dd7b77dc
-
SHA512
253d97d0286e328d160419dbfb5d584224840a13a2da5a2e49a52b2cca424789a1c9bbdb940e8172dc5edfd59cd0243b8c7218d3239a12b19e95dd44d423197c
-
SSDEEP
49152:Ws9sCyGQeG7+TUXXrwIh1WztyLc4bfIVteSujk:Ws9Xz3G7+0XrlwgVSte9jk
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1072 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1072 EXCEL.EXE 1072 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 1072 EXCEL.EXE 1072 EXCEL.EXE 1072 EXCEL.EXE 1072 EXCEL.EXE 1072 EXCEL.EXE 1072 EXCEL.EXE 1072 EXCEL.EXE 1072 EXCEL.EXE 1072 EXCEL.EXE 1072 EXCEL.EXE 1072 EXCEL.EXE 1072 EXCEL.EXE 1072 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1072 wrote to memory of 2356 1072 EXCEL.EXE 85 PID 1072 wrote to memory of 2356 1072 EXCEL.EXE 85
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\5de5205fa99898550915140e774cfb31_JaffaCakes118.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2356
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:4012