Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 00:38
Static task
static1
Behavioral task
behavioral1
Sample
a4b96441ba6f4ade3d54a70430db662b_JaffaCakes118.docx
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a4b96441ba6f4ade3d54a70430db662b_JaffaCakes118.docx
Resource
win10v2004-20240802-en
General
-
Target
a4b96441ba6f4ade3d54a70430db662b_JaffaCakes118.docx
-
Size
84KB
-
MD5
a4b96441ba6f4ade3d54a70430db662b
-
SHA1
0d2931870db517b19656b9dbc0efc6d45737b499
-
SHA256
eae36bf56595279d003b44de9e3b1c5ce81f5f07eeb6241a36fc4ce33b0636d1
-
SHA512
b635052fe3ee4fa4cdea2ae5c4b7698c6f93889d3614164d8415ebab0876e26ca8844e57b0929a1684c5fd1653d4247d47df1e55ba5c05e92c7db877fef6a1da
-
SSDEEP
1536:BmS1WExOoRX51j1BPpoynaSlqx1JxpHj3Sc7g2Q58WH6LGNC:cS1XRJHB2yrlqx1Jxh3Sc7g2Q5vaqNC
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\https:\files.catbox.moe\0azpj8.doc WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2240 WINWORD.EXE 2240 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeAuditPrivilege 2240 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2240 WINWORD.EXE 2240 WINWORD.EXE 2240 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\a4b96441ba6f4ade3d54a70430db662b_JaffaCakes118.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2240