Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01/08/2024, 21:33
Behavioral task
behavioral1
Sample
81cd2db1d5beaa133740011bce7a9861_JaffaCakes118.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
81cd2db1d5beaa133740011bce7a9861_JaffaCakes118.xls
Resource
win10v2004-20240730-en
General
-
Target
81cd2db1d5beaa133740011bce7a9861_JaffaCakes118.xls
-
Size
22KB
-
MD5
81cd2db1d5beaa133740011bce7a9861
-
SHA1
aa8de71188a5ec6eef727096f8c6b01605842270
-
SHA256
7a82b2b491fb8b3a4cfe27422bcc283e18506470ac1894e7c73eedfdaef92f62
-
SHA512
ed09c30e87492d4f1d6841f7138ecd9cb99dc6f5d6536abcef4b106d889bca246caeb8dc6260f00443046b2191c5df4b254c0ce3c422c7e46d335051e39e4310
-
SSDEEP
192:YQlhHo43AgdLSUX0n5aW8/R/o/POYZ49ex6VytDsxntjMrzN8CP6AbaAU3vf3sT:nZxpQnOYZ49ex66DsxntjMr58MbaBe
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1048 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1048 EXCEL.EXE 1048 EXCEL.EXE 1048 EXCEL.EXE 1048 EXCEL.EXE 1048 EXCEL.EXE 1048 EXCEL.EXE 1048 EXCEL.EXE 1048 EXCEL.EXE 1048 EXCEL.EXE 1048 EXCEL.EXE 1048 EXCEL.EXE 1048 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\81cd2db1d5beaa133740011bce7a9861_JaffaCakes118.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5bbba6b8b467789779b67352026b148e3
SHA1a515339854173b9b1767222576ac8042ebe4c630
SHA25659d51f7cad66657a59afc1fca7c2b4318947a9f52b2d2bd39080a27a59517f0b
SHA5124a3590d6ffc7ef84f0d966499bead17fc07757af73215832f392a9ea1b41322da66a29a67f198ac5af5b9752ec4da03be096e114b23bf243b0fdda9fda9e30e4