Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 11:20
Static task
static1
Behavioral task
behavioral1
Sample
bb83493d7c0ee77a92b1ee3836056864_JaffaCakes118.xls
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bb83493d7c0ee77a92b1ee3836056864_JaffaCakes118.xls
Resource
win10v2004-20240802-en
General
-
Target
bb83493d7c0ee77a92b1ee3836056864_JaffaCakes118.xls
-
Size
29KB
-
MD5
bb83493d7c0ee77a92b1ee3836056864
-
SHA1
dda4290c5801345943d8dfc5aecfbce4d657af46
-
SHA256
c544094ceb16efb8c9104a314879acfeb52b498251dc8b862e43671ac54a93e9
-
SHA512
abaa8c95205d755e7df7f305179f985ec9c10789cf2b3b26a00fd05edfa89cb6c932e3b4eb30000245cc15f79ee190675ba0902cac124ff8a677804d89277487
-
SSDEEP
384:OD8kLVQOYk/+nx8DpVAbaqe2vIOH/poGePDYP0ONx0YfDEQYLU/UI:4LVQOYk/+Oo1vIa/pO7YLtd/
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1244 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\bb83493d7c0ee77a92b1ee3836056864_JaffaCakes118.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1244