Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
101s -
max time network
73s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 00:38
Static task
static1
Behavioral task
behavioral1
Sample
a4b96441ba6f4ade3d54a70430db662b_JaffaCakes118.docx
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a4b96441ba6f4ade3d54a70430db662b_JaffaCakes118.docx
Resource
win10v2004-20240802-en
General
-
Target
a4b96441ba6f4ade3d54a70430db662b_JaffaCakes118.docx
-
Size
84KB
-
MD5
a4b96441ba6f4ade3d54a70430db662b
-
SHA1
0d2931870db517b19656b9dbc0efc6d45737b499
-
SHA256
eae36bf56595279d003b44de9e3b1c5ce81f5f07eeb6241a36fc4ce33b0636d1
-
SHA512
b635052fe3ee4fa4cdea2ae5c4b7698c6f93889d3614164d8415ebab0876e26ca8844e57b0929a1684c5fd1653d4247d47df1e55ba5c05e92c7db877fef6a1da
-
SSDEEP
1536:BmS1WExOoRX51j1BPpoynaSlqx1JxpHj3Sc7g2Q58WH6LGNC:cS1XRJHB2yrlqx1Jxh3Sc7g2Q5vaqNC
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\https:\files.catbox.moe\0azpj8.doc WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2344 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2344 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2344 WINWORD.EXE 2344 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2460 2344 WINWORD.EXE 32 PID 2344 wrote to memory of 2460 2344 WINWORD.EXE 32 PID 2344 wrote to memory of 2460 2344 WINWORD.EXE 32 PID 2344 wrote to memory of 2460 2344 WINWORD.EXE 32
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\a4b96441ba6f4ade3d54a70430db662b_JaffaCakes118.docx"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{93EEFB6B-14DD-4406-928D-D9C2CF10FA80}.FSD
Filesize128KB
MD50ab6d4e27782f5b3468f2261b710887c
SHA1f55bb0187e2bf353fd7e5a73ec277db7afcf5057
SHA25649fb09c9ed5366e1db23ab33bcd6197693291f50034bab8ff0b902cc29418754
SHA51273557ed99e958ec2e92bc573dab2cf894e6eaf24a66fabc1ecd58cf88e8cd7f27b2e7a6a2b7da269ed71c7be8d6ef88e645bcdfea144978057c7c4778f4875ce
-
C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
Filesize128KB
MD5e661292e21c3999d61635e436877f321
SHA1cd2c2f33c5ead342d7a73e16f29d7fc2a9452614
SHA256ec259f793e916df85dbdcd95b0b6f4d62a679380e2d9553c32a955c2a886569e
SHA51273652e50a1f1338717d7ee9b12f19f448807c2691f4caa14de12c1026dfdc4aa4198a4313417d7961dbc40cf581dad9c045b7ad23753cbc7b6b2dbbef64a4c88
-
C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{D6D82B43-BB22-412D-A75A-7FF2CF57740A}.FSD
Filesize128KB
MD5aee5a623a119dd0d943e1c9dbd1ec4d5
SHA17b41e068e14981390970a0512020b8e899284478
SHA256f9a4337b7e2e0a039ee311ddc2715128878d0b1bebbaf3110cad822a1e1af815
SHA512eded990cf2abb6564a92aaf4a8ec21a98c22325b2827b163ee53634cdf9e98e08b4fac286d2e00b890708211da87376df9f7a7a7692895454d7ab864bb56349c
-
Filesize
128KB
MD57ebe4e2706883e50ada20cc7a4d435f1
SHA1b3204ad05c3972e36d0de2809e4d2449caf45e50
SHA2565c5c23f7bfa03ad4c28f1d150a882a4fef839dba1cfe0b3c8f5233f0b7b76456
SHA51214b05f98bc95bd6f7cb5797c1d85af14a469d042859e9863acee64401e604fc864475ccb8c406f381e8fc4bfce12c1006b44cb3c908693295849547308ad6571
-
Filesize
19KB
MD591bc520b742ca3538aecb64c09521341
SHA1dcb5f94689733611780423799bfd5fd6da5d1488
SHA2569e1e7a4069c0153459eaf643258432a8727dda6907ad72b419af74d4af8d988f
SHA5123dca16f1808ab944fabdefd15ab3efb360f1a5b26bb995cf0abac855b56656dec8061f882eb8e083a04b16bbacc49d26f351be8e473f8556fc09d8ebd76f5f18