Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01/08/2024, 21:33

General

  • Target

    81cd2db1d5beaa133740011bce7a9861_JaffaCakes118.xls

  • Size

    22KB

  • MD5

    81cd2db1d5beaa133740011bce7a9861

  • SHA1

    aa8de71188a5ec6eef727096f8c6b01605842270

  • SHA256

    7a82b2b491fb8b3a4cfe27422bcc283e18506470ac1894e7c73eedfdaef92f62

  • SHA512

    ed09c30e87492d4f1d6841f7138ecd9cb99dc6f5d6536abcef4b106d889bca246caeb8dc6260f00443046b2191c5df4b254c0ce3c422c7e46d335051e39e4310

  • SSDEEP

    192:YQlhHo43AgdLSUX0n5aW8/R/o/POYZ49ex6VytDsxntjMrzN8CP6AbaAU3vf3sT:nZxpQnOYZ49ex66DsxntjMr58MbaBe

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\81cd2db1d5beaa133740011bce7a9861_JaffaCakes118.xls
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1940-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1940-1-0x00000000729DD000-0x00000000729E8000-memory.dmp

    Filesize

    44KB

  • memory/1940-3-0x00000000729DD000-0x00000000729E8000-memory.dmp

    Filesize

    44KB

  • memory/1940-7-0x00000000006E0000-0x00000000007E0000-memory.dmp

    Filesize

    1024KB

  • memory/1940-8-0x00000000006E0000-0x00000000007E0000-memory.dmp

    Filesize

    1024KB

  • memory/1940-12-0x00000000006E0000-0x00000000007E0000-memory.dmp

    Filesize

    1024KB

  • memory/1940-16-0x00000000006E0000-0x00000000007E0000-memory.dmp

    Filesize

    1024KB

  • memory/1940-17-0x00000000006E0000-0x00000000007E0000-memory.dmp

    Filesize

    1024KB

  • memory/1940-5-0x00000000006E0000-0x00000000007E0000-memory.dmp

    Filesize

    1024KB

  • memory/1940-6-0x00000000006E0000-0x00000000007E0000-memory.dmp

    Filesize

    1024KB

  • memory/1940-4-0x00000000006E0000-0x00000000007E0000-memory.dmp

    Filesize

    1024KB

  • memory/1940-19-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1940-20-0x00000000729DD000-0x00000000729E8000-memory.dmp

    Filesize

    44KB