Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    11/09/2024, 22:06

General

  • Target

    db4d30f4161223a2724bc36af1178057_JaffaCakes118.rtf

  • Size

    112KB

  • MD5

    db4d30f4161223a2724bc36af1178057

  • SHA1

    aa7e31fdef83e8c7044794023786d85600e603c9

  • SHA256

    94ee80dd4569d627da5c0af97a3668827495df37af8e6c4d46bb8729795da30c

  • SHA512

    f0f1e9e68484e287debe62e8de58b0450e8c8bf9323570bf313308bcf9c8d4e52a271738c86fa1fb365f8d81ea2ad0a4ac40b2b8a8444e21c9a26f1f7a5e5531

  • SSDEEP

    1536:qsqFf1kZ/WkorZX5wQ+H6U9f3Jqe95zbNf1kZ/WkorZX5wQ+H6UI:qVFKe/dp819fT95nNKe/dp81I

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\db4d30f4161223a2724bc36af1178057_JaffaCakes118.rtf"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2756
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:3064
    • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" -Embedding
      1⤵
      • System Location Discovery: System Language Discovery
      • Enumerates system info in registry
      • Suspicious use of SetWindowsHookEx
      PID:2776

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2756-0-0x000000002FE51000-0x000000002FE52000-memory.dmp

      Filesize

      4KB

    • memory/2756-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2756-2-0x000000007158D000-0x0000000071598000-memory.dmp

      Filesize

      44KB

    • memory/2756-17-0x000000007158D000-0x0000000071598000-memory.dmp

      Filesize

      44KB

    • memory/2776-7-0x000000007158D000-0x0000000071598000-memory.dmp

      Filesize

      44KB

    • memory/2776-16-0x0000000005E50000-0x0000000005F50000-memory.dmp

      Filesize

      1024KB

    • memory/2776-15-0x0000000005E50000-0x0000000005F50000-memory.dmp

      Filesize

      1024KB

    • memory/2776-12-0x0000000005E50000-0x0000000005F50000-memory.dmp

      Filesize

      1024KB

    • memory/2776-18-0x000000007158D000-0x0000000071598000-memory.dmp

      Filesize

      44KB

    • memory/2776-19-0x0000000005E50000-0x0000000005F50000-memory.dmp

      Filesize

      1024KB