Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240708-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240708-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/07/2024, 05:48

General

  • Target

    2f3039d152bc7b16e38936baf1f305ca_JaffaCakes118.docm

  • Size

    166KB

  • MD5

    2f3039d152bc7b16e38936baf1f305ca

  • SHA1

    ef393e5da9bc190783234fee92afcd29e40a49d7

  • SHA256

    7bca68f07452156848a09f32b0f46bf8156682cbd6fa442003b61d180923f331

  • SHA512

    c80c04ea6bc7f6dcb7d45909f9a75a6de489269eac5a81f43edb598b2bf0e26571857ccf015090bc5146f45e133db2aca955b0cd550fc0bd647a1a49a2b23558

  • SSDEEP

    3072:TS1XRJHB2yrlqx1Jxh3Sc7g2QhjsDhroHFNyJkc67dGTZVsaqJ:TmXReuGJ3ZsyV8HTOkwZVsx

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2f3039d152bc7b16e38936baf1f305ca_JaffaCakes118.docm" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\SBQGDSDR\39[1].htm

    Filesize

    114B

    MD5

    e89f75f918dbdcee28604d4e09dd71d7

    SHA1

    f9d9055e9878723a12063b47d4a1a5f58c3eb1e9

    SHA256

    6dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023

    SHA512

    8df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0

  • C:\Users\Admin\AppData\Local\Temp\TCD1837.tmp\sist02.xsl

    Filesize

    245KB

    MD5

    f883b260a8d67082ea895c14bf56dd56

    SHA1

    7954565c1f243d46ad3b1e2f1baf3281451fc14b

    SHA256

    ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

    SHA512

    d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    270B

    MD5

    2989de92814c2e5b832f689f37e933b3

    SHA1

    eadd9321419299eadf5befc536ffc5e6268a84ab

    SHA256

    886710e255e3ce3732f6a97a8aeeb2f046153635f4e31d41d2f42d20ab08d604

    SHA512

    6c73d623333fc921aad64a985b154b2833961ccc7f285eb9795dade98463c2b1736b99e2aafc94013ee4943033a8016476ef9d911ed2c376f46ede0fba5d6324

  • memory/4840-9-0x00007FF995990000-0x00007FF995B85000-memory.dmp

    Filesize

    2.0MB

  • memory/4840-15-0x00007FF995990000-0x00007FF995B85000-memory.dmp

    Filesize

    2.0MB

  • memory/4840-6-0x00007FF995990000-0x00007FF995B85000-memory.dmp

    Filesize

    2.0MB

  • memory/4840-8-0x00007FF995990000-0x00007FF995B85000-memory.dmp

    Filesize

    2.0MB

  • memory/4840-0-0x00007FF955A10000-0x00007FF955A20000-memory.dmp

    Filesize

    64KB

  • memory/4840-10-0x00007FF995990000-0x00007FF995B85000-memory.dmp

    Filesize

    2.0MB

  • memory/4840-11-0x00007FF9537A0000-0x00007FF9537B0000-memory.dmp

    Filesize

    64KB

  • memory/4840-12-0x00007FF995990000-0x00007FF995B85000-memory.dmp

    Filesize

    2.0MB

  • memory/4840-7-0x00007FF995990000-0x00007FF995B85000-memory.dmp

    Filesize

    2.0MB

  • memory/4840-5-0x00007FF995A2D000-0x00007FF995A2E000-memory.dmp

    Filesize

    4KB

  • memory/4840-13-0x00007FF995990000-0x00007FF995B85000-memory.dmp

    Filesize

    2.0MB

  • memory/4840-14-0x00007FF9537A0000-0x00007FF9537B0000-memory.dmp

    Filesize

    64KB

  • memory/4840-16-0x00007FF995990000-0x00007FF995B85000-memory.dmp

    Filesize

    2.0MB

  • memory/4840-4-0x00007FF955A10000-0x00007FF955A20000-memory.dmp

    Filesize

    64KB

  • memory/4840-18-0x00007FF995990000-0x00007FF995B85000-memory.dmp

    Filesize

    2.0MB

  • memory/4840-20-0x00007FF995990000-0x00007FF995B85000-memory.dmp

    Filesize

    2.0MB

  • memory/4840-19-0x00007FF995990000-0x00007FF995B85000-memory.dmp

    Filesize

    2.0MB

  • memory/4840-17-0x00007FF995990000-0x00007FF995B85000-memory.dmp

    Filesize

    2.0MB

  • memory/4840-3-0x00007FF955A10000-0x00007FF955A20000-memory.dmp

    Filesize

    64KB

  • memory/4840-1-0x00007FF955A10000-0x00007FF955A20000-memory.dmp

    Filesize

    64KB

  • memory/4840-63-0x00007FF995990000-0x00007FF995B85000-memory.dmp

    Filesize

    2.0MB

  • memory/4840-2-0x00007FF955A10000-0x00007FF955A20000-memory.dmp

    Filesize

    64KB

  • memory/4840-569-0x00007FF955A10000-0x00007FF955A20000-memory.dmp

    Filesize

    64KB

  • memory/4840-568-0x00007FF955A10000-0x00007FF955A20000-memory.dmp

    Filesize

    64KB

  • memory/4840-571-0x00007FF955A10000-0x00007FF955A20000-memory.dmp

    Filesize

    64KB

  • memory/4840-570-0x00007FF955A10000-0x00007FF955A20000-memory.dmp

    Filesize

    64KB

  • memory/4840-572-0x00007FF995990000-0x00007FF995B85000-memory.dmp

    Filesize

    2.0MB