Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
7be90b902ac...18.exe
windows7-x64
7be90b902ac...18.exe
windows10-2004-x64
7$PLUGINSDI...if.dll
windows7-x64
3$PLUGINSDI...if.dll
windows10-2004-x64
3$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...os.dll
windows7-x64
3$PLUGINSDI...os.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$PLUGINSDI...ay.dll
windows7-x64
7$PLUGINSDI...ay.dll
windows10-2004-x64
7$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$TEMP/instloffer.exe
windows7-x64
3$TEMP/instloffer.exe
windows10-2004-x64
3$TEMP/license.rtf
windows7-x64
4$TEMP/license.rtf
windows10-2004-x64
1Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 12:12
Behavioral task
behavioral1
Sample
be90b902ac9862bd7e37125cf35e13f2_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
be90b902ac9862bd7e37125cf35e13f2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/AnimGif.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/AnimGif.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/BgWorker.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/BgWorker.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/ExecDos.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/ExecDos.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsArray.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsArray.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
$TEMP/instloffer.exe
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
$TEMP/instloffer.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$TEMP/license.rtf
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
$TEMP/license.rtf
Resource
win10v2004-20240802-en
General
-
Target
$TEMP/license.rtf
-
Size
15KB
-
MD5
a68888617e49a38ecdc9d37d4ad4bb0f
-
SHA1
8ead5f3a07309bd43d4a7d3050816daa3eb794ba
-
SHA256
b64310f29eeaf0f12c84c015b76af682a1904a4e25a9dcf3619a579d1315dca7
-
SHA512
f8120ba06f7fa6c3f6e9e56be21d80deec2e8563fdebb168f9fa16cfe36cbdf84d78d5f750056b82bc6e9653104840f58a6e56cf69e25c60bd8fb64a64d3117f
-
SSDEEP
192:doyiN7vCHjJnNCN2N6Sc9wnsmjeA9WxAWRVEzSEfcrYEQxTHzridjlpNoj6RVIQj:OyU4CUoensmmxau0HCxpM6R+QDVsMx
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2264 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2264 WINWORD.EXE 2264 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2264 wrote to memory of 3004 2264 WINWORD.EXE 31 PID 2264 wrote to memory of 3004 2264 WINWORD.EXE 31 PID 2264 wrote to memory of 3004 2264 WINWORD.EXE 31 PID 2264 wrote to memory of 3004 2264 WINWORD.EXE 31
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\$TEMP\license.rtf"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:3004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD5e2df2839b94cd203f4c913cd38ca1356
SHA1db021fff52884664f4fad2cc7f31fdd9a3d95152
SHA256e99902a6c1a43d0ff5d23b4a7ff10d1f41e52d6a8899bb2b6bd8a19f2b5ca5d6
SHA512dc765f4b611cf055866d9e73ca1c1735805c6eb559d416e0763e0a7ebbdbc748517ef90a7868825c1e57e6d0ae0b951c54fc3c1f969578a25931b078f2ac740b