Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    25/06/2024, 16:39

General

  • Target

    0ec921776ae38f6584f6a354e3c6651e_JaffaCakes118.doc

  • Size

    238KB

  • MD5

    0ec921776ae38f6584f6a354e3c6651e

  • SHA1

    9750a3fcc7186769bba755d5ceeecad09c8df4e4

  • SHA256

    456fb7d1f6c71ed4f2e4de9b8788fa104f70caa9c6b6e7c69867e671d736a2ea

  • SHA512

    56227db73736f118b957f9e1ca068f8a9389d11009312d7cb27a412c5321c9dfbfb34f5b76dd5bb92cf36ac33b7fb429ca47f23dded0cde1fc008ee7a93ac516

  • SSDEEP

    3072:a/wDvWETOgnHJcIKBs7GwdS31DMnkpWoYX9:a/avWETrHJ9AqU31YkQoYt

Score
7/10

Malware Config

Signatures

  • Abuses OpenXML format to download file from external location 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0ec921776ae38f6584f6a354e3c6651e_JaffaCakes118.doc"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2632
    • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
      1⤵
      • Abuses OpenXML format to download file from external location
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2364
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
      1⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:884
    • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
      1⤵
      • Abuses OpenXML format to download file from external location
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2424
    • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
      1⤵
      • Abuses OpenXML format to download file from external location
      • Enumerates system info in registry
      • Suspicious use of SetWindowsHookEx
      PID:2312
    • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
      1⤵
        PID:2396

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD

        Filesize

        128KB

        MD5

        8544f81284b543b58fc23d4f2fafc00e

        SHA1

        3b426e65bfe7fb234e4a150523a9ab78ed352b2d

        SHA256

        9db132b42b4bfe93c3880392af12b8b0d4e431d1833345dce31e40c5a18c436f

        SHA512

        efa099995665fdf0156d2b3e2804defa15e8241aecd38103bcb24ed9c83a99375cdf3ef98de809a68c6624a33aaa8d754b54be7183327f554c07fa890edfeffd

      • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{70783B85-C284-4A94-A5D9-61A7078613F2}.FSD

        Filesize

        128KB

        MD5

        68438764de9eecdd8e7605c13228746a

        SHA1

        1af537c40b59997c45ad7e75acdbb43a453147ad

        SHA256

        1f8fbbeb1490588502563623655d837d27e6e380baaccf6fa87918c9fcb5abb3

        SHA512

        187844722c2097fb59d76ef032831945ba3c322d12758d7221ca81ede826a875108b983fb00c5caa4bb6816552d50c66f232432c8f6e92956f7a1b721957d171

      • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{70783B85-C284-4A94-A5D9-61A7078613F2}.FSD

        Filesize

        128KB

        MD5

        0f38117c3bca995a85cf1eb4940144ea

        SHA1

        58886619ee3e08a9a173ff7c86d42cfffe8ec833

        SHA256

        d44e28abae98b1d9e8e1d1570e4e2025422a12cc21df0982f91fe3a06423510a

        SHA512

        a4d34214a98b715e7806b257eb71262eb1beb4f7cb520f7fe79428eb8360805e0862dec3d78c0f9bbfe8688731496299fdbc331970a4784ad7baf7530599d440

      • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSF-CTBL.FSF

        Filesize

        114B

        MD5

        dd5b7e9974660e92a8f07757f869de2e

        SHA1

        0fcff8c560222d88c59832ba065349bc5f840783

        SHA256

        f436b86607097f1b4eb96b92b7ff09e49b944a7cf69d19046194097283d37af4

        SHA512

        8bf1f0a214422c7289d42537c464dcda5fc1e598b0a3854fb326acb94c74e86491b4cf3b267cf6b98ea8be795f3fab551a1980ae0ac45f0f680b0b26a4bc5d2a

      • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

        Filesize

        128KB

        MD5

        3dcca6393eec758bd4918f79d5ad9fb3

        SHA1

        f6857daef5389d4154b36efaee011b99c3bb393d

        SHA256

        78bcf9c9cf90ec0afeb393c508e9cc184fca6b892a2ae8e4f56d3e6cedcd0936

        SHA512

        5145998af8f35a9ee2b761fd7ff960662877d91f8598014fa1a0ac843a7382f5593d0f74e846134d571d35d60402bcba7f63e840f88ee1de47a5c8ef36e1c8ed

      • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{57811505-434E-4F20-A8E2-BB31C1947C20}.FSD

        Filesize

        128KB

        MD5

        1f9ac8ad773feb0f252391cf9c3a1cc8

        SHA1

        6057f848f78c58ef5c9c2bd29e877675939354e2

        SHA256

        99e894fedf201595f27d9bfe8c6d0218315137997c38a8c8e0c3e07561a3313c

        SHA512

        5e8adafa8713c4c63e5c1a9e7e9f89260f395385630d7124a7ba78de6bef2edfa624d303eb870182456b2f6ed504bdc886294748abac0cb4ba7f4247c452b673

      • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSF-{0E1EEE64-E8C6-4E2A-9759-63CF07FD8988}.FSF

        Filesize

        114B

        MD5

        230cd3850701b442a99debcb0dde6f29

        SHA1

        41fc8e208abe51c73feb3f89d32ab95c7d0fd109

        SHA256

        5b3fd2070a77df1083f444a4cf530ced5d9e994e5ff9cf7a24d8627f71da52a4

        SHA512

        b94400edbf29853e62f3e01f3fe3ed9c7c4001d28b1b0ed4b930758dcc5957f5d580f3287c4ba24fe98f43294c891d5addb58716afbfcf3ef6be2a9c8787f99a

      • C:\Users\Admin\AppData\Local\Temp\VBE\MSForms.exd

        Filesize

        143KB

        MD5

        1c92a1d144e3a55e5ff5515a7b93bf12

        SHA1

        a2b7d46a4e44b1065c26af68eb669aa28d20492e

        SHA256

        d69203ec09bcd3304c7a292fca4044d42dd53345ed6684df307876a7b414449a

        SHA512

        d26476df254b4a7b12fb25962b75f9ef4e869fbc7da0d965421ebbced484352202a6ffc6a237e3af05dd43e326ea17692d6b50521fb3862a337d8c37c5d892bb

      • C:\Users\Admin\AppData\Local\Temp\{54B8702F-A23B-48B3-9DD1-8C32075FAEAB}

        Filesize

        128KB

        MD5

        4b2f5b2fe34dd433779f96c61170441b

        SHA1

        d02df6a2f8198a720c8ad201a5774e7bbe34d238

        SHA256

        b199ffbc378f26d7057d8ae9647c12979994fa7a9a49a5a5ba4428992d9e7c65

        SHA512

        1069484b0df06137c1a638887fd63bd63161199c9b2dbb009ee604652a888dee2cffbfc5bc4fccbc286781a9337f46db0aaeb6b20d38d5d32f16b9749ffde97f

      • C:\Users\Admin\AppData\Roaming\Microsoft\Office\MSO1033.acl

        Filesize

        36KB

        MD5

        4b595be73a0a558e93cc521ae078bbf6

        SHA1

        0e6169ae01f9506712d04ecda88b5dde592db334

        SHA256

        a44c6e1f9d323aadbb2e62feb6081e58e1250b33cd4a4b9f1a025fb1603bee31

        SHA512

        4f952da18c680cee07f78974ee3d4cdebd0145a4400c2b41a4aeb756a21b97781c7176370308e587eebd746a1acf350e5a6cdac7bb74281719046314578307a2

      • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

        Filesize

        20KB

        MD5

        1759644a17881cf5b3fe47d06e9cb631

        SHA1

        7952ac1a31588e258ac979d2d3f60b293cdbb609

        SHA256

        b2b11cdae3c182b145676ac1bd16b2f679bdd55901d8fe7e1fdf031342adf447

        SHA512

        cba348da899b79e73b88bd6b152cd3835ef6f608f330b33c7b0f1d60a2a7521e4e46d5cfb3838f7230b73fa28ff65cbfcf7fa895259bb0ddc051015690964e9b

      • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

        Filesize

        2B

        MD5

        f3b25701fe362ec84616a93a45ce9998

        SHA1

        d62636d8caec13f04e28442a0a6fa1afeb024bbb

        SHA256

        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

        SHA512

        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

      • memory/2256-0-0x000000002FC71000-0x000000002FC72000-memory.dmp

        Filesize

        4KB

      • memory/2256-70-0x0000000010680000-0x0000000010780000-memory.dmp

        Filesize

        1024KB

      • memory/2256-20-0x0000000071A5D000-0x0000000071A68000-memory.dmp

        Filesize

        44KB

      • memory/2256-2-0x0000000071A5D000-0x0000000071A68000-memory.dmp

        Filesize

        44KB

      • memory/2256-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/2364-1025-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB