Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
73475060e47...18.exe
windows7-x64
73475060e47...18.exe
windows10-2004-x64
7$PLUGINSDI...if.dll
windows7-x64
3$PLUGINSDI...if.dll
windows10-2004-x64
3$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...os.dll
windows7-x64
3$PLUGINSDI...os.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$PLUGINSDI...ay.dll
windows7-x64
7$PLUGINSDI...ay.dll
windows10-2004-x64
7$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$TEMP/instloffer.exe
windows7-x64
3$TEMP/instloffer.exe
windows10-2004-x64
3$TEMP/license.rtf
windows7-x64
4$TEMP/license.rtf
windows10-2004-x64
1Analysis
-
max time kernel
101s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 11:05
Behavioral task
behavioral1
Sample
3475060e471e718115f5e75c440c7301_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3475060e471e718115f5e75c440c7301_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/AnimGif.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/AnimGif.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/BgWorker.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/BgWorker.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/ExecDos.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/ExecDos.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsArray.dll
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsArray.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
$TEMP/instloffer.exe
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
$TEMP/instloffer.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
$TEMP/license.rtf
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
$TEMP/license.rtf
Resource
win10v2004-20240709-en
General
-
Target
$TEMP/license.rtf
-
Size
15KB
-
MD5
f40747061b98d7118f8fb6912cd33cc3
-
SHA1
388f41d9afd06fbd2ff34283ea90aa45e383e606
-
SHA256
4288bad47334871da0ded5dc39bc0d28facb14c37ba85ddc05b131fe81ab04ab
-
SHA512
85f5234667f7d21fb1ca826c8691106f0114cbd705e62bf7f7d5756a1ca65407f29c18f8d9de63687e3dd5e1178471c20bed4665491740953e648f309abc28dd
-
SSDEEP
192:doyiNUvCHjJnUCN2N6SmtwnssQrjSx/WRMVzSTfNrYEQxTHSridjypNoS6RVIQ8N:OyUkCUSOnss1x3Q0H3mpD6R+QDVhj4
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2432 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2432 WINWORD.EXE 2432 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2292 2432 WINWORD.EXE 31 PID 2432 wrote to memory of 2292 2432 WINWORD.EXE 31 PID 2432 wrote to memory of 2292 2432 WINWORD.EXE 31 PID 2432 wrote to memory of 2292 2432 WINWORD.EXE 31
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\$TEMP\license.rtf"1⤵
- Drops file in Windows directory
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2292
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD58d61bdf982a593c8956d9f6ec111e2b8
SHA189dbb42787ff2b00125108e44862c3428cff0f33
SHA256d3e9be6084427f04e8c335c63677920244de85448f59b48fb8323574c4c47d96
SHA5128066f876bb7e025dfca8c4043d9e6046e974454dcd3e8ba102626c789250e72359f68b58062cc303f6c41bc97b00f4bb04c884382ad053004a8f49dccbab8406