Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    20/06/2024, 08:48

General

  • Target

    04774125f6161a45612e6dec0c59119d_JaffaCakes118.doc

  • Size

    49KB

  • MD5

    04774125f6161a45612e6dec0c59119d

  • SHA1

    8c96fcb34f42d21dca895cc56947f417023ce987

  • SHA256

    03f84c576aa87510e8c0d37e2486b40c94f3a3db001d269d4679cbcb242a4266

  • SHA512

    a008858e16c3bb2d339636c9e853a93e162d39628c496a3d6c22bb5140a7ab3e2708d4703ccb17b68178b1cf54389b905c65448fd6e7008f9236334b15389b4c

  • SSDEEP

    192:9eTc88RSAIeeeeeeeeeeeGmTCgxJWzvkisUsfXdqeFJjA0jiQNUXtxkcz/bWWmqO:AlpAcmPIv4MeXjA0jiQgt5VG+L

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Deletes itself 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\04774125f6161a45612e6dec0c59119d_JaffaCakes118.doc"
    1⤵
    • Deletes itself
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1660
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2368

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\04774125f6161a45612e6dec0c59119d_JaffaCakes118.doc

      Filesize

      59KB

      MD5

      391b4cd8c246a6f5a3b83cb2e67fa82f

      SHA1

      6ea0094c2f4a539dfcc5d308f810ba45abb66736

      SHA256

      c5cbcd312f8ccff031aa35fcc67169e257165414411e87800fe760bc17fbf839

      SHA512

      b9e0a90decd3a18e762a5620438b3eccd922a45634b725f19c6f227c5c364fb1cfb2d7693535e8a84dbdb74d61393247c5bb24bd068f9d2abda7d131c398f0ac

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      28KB

      MD5

      4381b5f4eb5ada7c4a65f2688e1cc627

      SHA1

      0ce4b0e0deb291848b2be94a63ac7f9dd270da11

      SHA256

      efad2515d30d82e2a6f1554e33e76ab4003b6d873f7c7cee5c796bac415bdf9e

      SHA512

      2d83946d83f81f1242fb62b0ac7eaa4f305d2002ddb04c65c43fc884b22a8428fc4c25faa540190378442abc157fd447713e8726830b83ae7644aadc1747cf95

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      25KB

      MD5

      fb3e5dda0df9d6a757c827a5266dfc03

      SHA1

      d4aa4d2ebd4cd635d8fe77592607348fbf9e539c

      SHA256

      46ca95b4be223b469b5fe93145269dfe47729680835f57509ebf0c47cced2cca

      SHA512

      5d41d64925a473031b51527588312037fad84866381214863d0ed666ef11dd7ffa2100cc1bde44e767adc49df64db8795cc7fd6cff86a6c6c1a9f2f839a4ee8d

    • C:\VB9989.tmp

      Filesize

      1KB

      MD5

      28d341c72a7e794fc02a71602a379532

      SHA1

      4d5e2a325689595376e72aacd34582e68ac1e5cf

      SHA256

      7641d28e39f88898226c58d605732655637335562af35319911825cccae747c9

      SHA512

      e4f4d73abb9fab936896a4c28a048013e3c49bbe76031965c18f540f7700598d9a3521c79e7c841f1c43892b245653a828b112baa5a818b5ca7ada46d806f270

    • C:\temp.tmp

      Filesize

      225B

      MD5

      519755378e58a854e2bd4652f7195193

      SHA1

      eca94844a06772a58cafa8bb4fccb054cdb450c0

      SHA256

      b5aa96f3f7930aced20f57e7f4fe5957e37be0f504fb2f49606f80b19e79bf20

      SHA512

      b1e3a0dc5562e558bb8542c4f9288ce4493ddc9c5c533fff9a07e008a6acef0fbacfc03d867d5ff54fb602e9f3148fa073bb93a1ca386ea42f88b063f0726d52

    • C:\temp.tmp

      Filesize

      1KB

      MD5

      69690d79eb459c7474ce5f029c3859b3

      SHA1

      dbabb04ae2e28a37387a55b03334e1e8b8d83200

      SHA256

      50a85970bdafe4f319d21747b32f08289850063b2b3153a0e9c1c1bc37abcf22

      SHA512

      4454b8f22981938b26b69417385b7a72b95433636bc2155e12c7a81d627be2dd4b58934f3d63b5479f2bab27226053507561967baed4b962f42cca47f3532bd7

    • memory/1660-19-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/1660-0-0x000000002F371000-0x000000002F372000-memory.dmp

      Filesize

      4KB

    • memory/1660-57-0x0000000070BBD000-0x0000000070BC8000-memory.dmp

      Filesize

      44KB

    • memory/1660-58-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/1660-82-0x0000000005030000-0x0000000005130000-memory.dmp

      Filesize

      1024KB

    • memory/1660-81-0x0000000005030000-0x0000000005130000-memory.dmp

      Filesize

      1024KB

    • memory/1660-18-0x00000000004D0000-0x00000000005D0000-memory.dmp

      Filesize

      1024KB

    • memory/1660-2-0x0000000070BBD000-0x0000000070BC8000-memory.dmp

      Filesize

      44KB

    • memory/1660-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1660-110-0x0000000005030000-0x0000000005130000-memory.dmp

      Filesize

      1024KB

    • memory/1660-120-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB