Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    139s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/08/2024, 15:01

General

  • Target

    bc3891b9029229e2af500c6600cad6a6_JaffaCakes118.docm

  • Size

    166KB

  • MD5

    bc3891b9029229e2af500c6600cad6a6

  • SHA1

    dd3e26001d98b3bc2faf912c401bc5c5bbac31ba

  • SHA256

    fc5402c5b704b7e3a60a662ac119b3503e1cb185c58da0064dfb9fdc2b097a44

  • SHA512

    237a7bd2b97adcf67f0dce3046bf0a33b798dd9a16e78c5fce840145459df5d59c79b360e321b6d880a387b258e88a98f0c29d746db8329456a86183f4365504

  • SSDEEP

    3072:UyvES1XRJHB2yrlqx1Jxh3Sc7g2QhxmKiIrUl9ugcnSE4BcyYbbSa5haq6Z:UysmXReuGJ3ZsqK5UknSnbghC

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\bc3891b9029229e2af500c6600cad6a6_JaffaCakes118.docm" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Program Files\Microsoft Office\Root\Office16\MsoSync.exe
      "C:\Program Files\Microsoft Office\Root\Office16\MsoSync.exe"
      2⤵
      • Process spawned unexpected child process
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2228

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.accdb

    Filesize

    512KB

    MD5

    3b762f3bb4f10e6f9f7e34863b295737

    SHA1

    26bf841ef2bc620c99f6e8f3e69e263d20f1d690

    SHA256

    c79cf9b85bd0ed50284a83da326a82cd2814010ae6092a234bffc88e0b153b8b

    SHA512

    8227906389753f43c4109a059bdeae72265a1a82a3c528f307a3b68515472910c08becb439b609a9fa9ee09de47bf1ae7c24d16a3afeac55302b5054864b3515

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.laccdb

    Filesize

    128B

    MD5

    4c94343b31f8bd8ace8639566eb585c9

    SHA1

    be4348e9879195b312d776ffe42c0b5c414c687a

    SHA256

    b6176aef4babb6960c7d4aa692b506e8f46a5abb2b109c826ba6e75564070242

    SHA512

    a664f9ec417b97ccfcbc19142a046f1ea16935f446d32e5f0a56c316a49625e02551947e2a0328dcd598a0e57eb8ab7c51e37dbf59a8ae55c0a38f2987a917d5

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\9D62C040-73C6-4618-9092-2639B2796949

    Filesize

    170KB

    MD5

    398758eb4e1130b623d83efe87de72a5

    SHA1

    39fe87ad27be2d9867393f384b6b11e77c9846d4

    SHA256

    c955b3fb92fa983ed32d32a4cf9b9b272cef7396391a834871d236d65dc8aa97

    SHA512

    389f5f27a5f783569e2a54613c32202106d65a39901a27c31311c60b4d90bbe019962aa8098b20d47aa068e403aa265f41a086e12b53a7f84a3c3d66cae6c869

  • C:\Users\Admin\AppData\Local\Temp\TCDF9DF.tmp\iso690.xsl

    Filesize

    263KB

    MD5

    ff0e07eff1333cdf9fc2523d323dd654

    SHA1

    77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

    SHA256

    3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

    SHA512

    b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • memory/2156-11-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

    Filesize

    2.0MB

  • memory/2156-57-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

    Filesize

    2.0MB

  • memory/2156-9-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

    Filesize

    2.0MB

  • memory/2156-10-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

    Filesize

    2.0MB

  • memory/2156-12-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

    Filesize

    2.0MB

  • memory/2156-13-0x00007FFF43C30000-0x00007FFF43C40000-memory.dmp

    Filesize

    64KB

  • memory/2156-1-0x00007FFF862ED000-0x00007FFF862EE000-memory.dmp

    Filesize

    4KB

  • memory/2156-15-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

    Filesize

    2.0MB

  • memory/2156-18-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

    Filesize

    2.0MB

  • memory/2156-19-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

    Filesize

    2.0MB

  • memory/2156-20-0x00007FFF43C30000-0x00007FFF43C40000-memory.dmp

    Filesize

    64KB

  • memory/2156-17-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

    Filesize

    2.0MB

  • memory/2156-16-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

    Filesize

    2.0MB

  • memory/2156-14-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

    Filesize

    2.0MB

  • memory/2156-7-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

    Filesize

    2.0MB

  • memory/2156-6-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

    Filesize

    2.0MB

  • memory/2156-2-0x00007FFF462D0000-0x00007FFF462E0000-memory.dmp

    Filesize

    64KB

  • memory/2156-577-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

    Filesize

    2.0MB

  • memory/2156-574-0x00007FFF462D0000-0x00007FFF462E0000-memory.dmp

    Filesize

    64KB

  • memory/2156-573-0x00007FFF462D0000-0x00007FFF462E0000-memory.dmp

    Filesize

    64KB

  • memory/2156-0-0x00007FFF462D0000-0x00007FFF462E0000-memory.dmp

    Filesize

    64KB

  • memory/2156-8-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

    Filesize

    2.0MB

  • memory/2156-55-0x00007FFF862ED000-0x00007FFF862EE000-memory.dmp

    Filesize

    4KB

  • memory/2156-56-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

    Filesize

    2.0MB

  • memory/2156-3-0x00007FFF462D0000-0x00007FFF462E0000-memory.dmp

    Filesize

    64KB

  • memory/2156-46-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

    Filesize

    2.0MB

  • memory/2156-5-0x00007FFF462D0000-0x00007FFF462E0000-memory.dmp

    Filesize

    64KB

  • memory/2156-4-0x00007FFF462D0000-0x00007FFF462E0000-memory.dmp

    Filesize

    64KB

  • memory/2228-548-0x00007FFF462D0000-0x00007FFF462E0000-memory.dmp

    Filesize

    64KB

  • memory/2228-40-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

    Filesize

    2.0MB

  • memory/2228-44-0x00007FFF462D0000-0x00007FFF462E0000-memory.dmp

    Filesize

    64KB

  • memory/2228-43-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

    Filesize

    2.0MB

  • memory/2228-270-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

    Filesize

    2.0MB

  • memory/2228-38-0x00007FFF462D0000-0x00007FFF462E0000-memory.dmp

    Filesize

    64KB

  • memory/2228-551-0x00007FFF462D0000-0x00007FFF462E0000-memory.dmp

    Filesize

    64KB

  • memory/2228-45-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

    Filesize

    2.0MB

  • memory/2228-42-0x00007FFF462D0000-0x00007FFF462E0000-memory.dmp

    Filesize

    64KB

  • memory/2228-550-0x00007FFF462D0000-0x00007FFF462E0000-memory.dmp

    Filesize

    64KB

  • memory/2228-552-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

    Filesize

    2.0MB

  • memory/2228-41-0x00007FFF86250000-0x00007FFF86445000-memory.dmp

    Filesize

    2.0MB

  • memory/2228-549-0x00007FFF462D0000-0x00007FFF462E0000-memory.dmp

    Filesize

    64KB

  • memory/2228-39-0x00007FFF462D0000-0x00007FFF462E0000-memory.dmp

    Filesize

    64KB