Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/09/2024, 22:06

General

  • Target

    db4d30f4161223a2724bc36af1178057_JaffaCakes118.rtf

  • Size

    112KB

  • MD5

    db4d30f4161223a2724bc36af1178057

  • SHA1

    aa7e31fdef83e8c7044794023786d85600e603c9

  • SHA256

    94ee80dd4569d627da5c0af97a3668827495df37af8e6c4d46bb8729795da30c

  • SHA512

    f0f1e9e68484e287debe62e8de58b0450e8c8bf9323570bf313308bcf9c8d4e52a271738c86fa1fb365f8d81ea2ad0a4ac40b2b8a8444e21c9a26f1f7a5e5531

  • SSDEEP

    1536:qsqFf1kZ/WkorZX5wQ+H6U9f3Jqe95zbNf1kZ/WkorZX5wQ+H6UI:qVFKe/dp819fT95nNKe/dp81I

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 53 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\db4d30f4161223a2724bc36af1178057_JaffaCakes118.rtf" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1060
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe"
      2⤵
      • Process spawned unexpected child process
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1620
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious use of SetWindowsHookEx
    PID:3116

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\B8B83267-EE4B-4807-B7EA-4DC736343358

    Filesize

    170KB

    MD5

    11b96097fd4b24f24e1f6f27e0eeeb6b

    SHA1

    1a99b9b6bb760ed82b3c98adf723aefda3e4924e

    SHA256

    1a3eb63bb80ba6980a881802f1bb44f39ff66604dc0500314ad4e5c9610169d6

    SHA512

    912d8df3b619d0a670f093c1145268071add4e42628395dceb299458e7141d1134aa3c69f4995200acbc41e7264024025e6fa4920523f2f0d105d524d7f77b15

  • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres

    Filesize

    2KB

    MD5

    9e122dcfd21be881395cb380b7887e50

    SHA1

    8e7f5e444aca90641cfad363bd6d2ef9991b3bf0

    SHA256

    53016c31e35b990f508196bba559742b2beeda419679719906681a9a672c8680

    SHA512

    e369a7454c0bfb3aa0fd64f3644daf98b24ac4e5ccbe61144c765ccfdacbbe09a4350df9389ba18e5ef066a3b6d3742fa1807c80a012e175f2e71da03aa8692e

  • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbres

    Filesize

    2KB

    MD5

    6461d3a211d4b8d0f66f0c46d1b7b490

    SHA1

    c2c31be082cb4c381634f50a864e4b250220296f

    SHA256

    cf256745b2c4fa10e73f4200daa49f2db0e6c2dc7d2d2c7bbc8c682b53b951be

    SHA512

    ac1a60ce0e9e87560477d72efb686a651801af941219f54a1c4003702665185f48cee3f9a964222f51c03ad55ed0f635d3f50e64139c2cd30aafa17664256f37

  • memory/1060-20-0x00007FFE4C540000-0x00007FFE4C550000-memory.dmp

    Filesize

    64KB

  • memory/1060-3-0x00007FFE4EA50000-0x00007FFE4EA60000-memory.dmp

    Filesize

    64KB

  • memory/1060-9-0x00007FFE8E9D0000-0x00007FFE8EBC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1060-10-0x00007FFE8E9D0000-0x00007FFE8EBC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1060-8-0x00007FFE8E9D0000-0x00007FFE8EBC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1060-11-0x00007FFE4C540000-0x00007FFE4C550000-memory.dmp

    Filesize

    64KB

  • memory/1060-7-0x00007FFE8E9D0000-0x00007FFE8EBC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1060-6-0x00007FFE8E9D0000-0x00007FFE8EBC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1060-15-0x00007FFE8E9D0000-0x00007FFE8EBC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1060-18-0x00007FFE8E9D0000-0x00007FFE8EBC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1060-19-0x00007FFE8E9D0000-0x00007FFE8EBC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1060-17-0x00007FFE8E9D0000-0x00007FFE8EBC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1060-16-0x00007FFE8E9D0000-0x00007FFE8EBC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1060-14-0x00007FFE8E9D0000-0x00007FFE8EBC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1060-13-0x00007FFE8E9D0000-0x00007FFE8EBC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1060-12-0x00007FFE8E9D0000-0x00007FFE8EBC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1060-68-0x00007FFE8EA6D000-0x00007FFE8EA6E000-memory.dmp

    Filesize

    4KB

  • memory/1060-1-0x00007FFE8EA6D000-0x00007FFE8EA6E000-memory.dmp

    Filesize

    4KB

  • memory/1060-5-0x00007FFE4EA50000-0x00007FFE4EA60000-memory.dmp

    Filesize

    64KB

  • memory/1060-67-0x00007FFE8E9D0000-0x00007FFE8EBC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1060-4-0x00007FFE4EA50000-0x00007FFE4EA60000-memory.dmp

    Filesize

    64KB

  • memory/1060-0-0x00007FFE4EA50000-0x00007FFE4EA60000-memory.dmp

    Filesize

    64KB

  • memory/1060-2-0x00007FFE4EA50000-0x00007FFE4EA60000-memory.dmp

    Filesize

    64KB

  • memory/1620-91-0x00000174DC740000-0x00000174DC741000-memory.dmp

    Filesize

    4KB

  • memory/1620-85-0x00000174DC740000-0x00000174DC741000-memory.dmp

    Filesize

    4KB

  • memory/1620-87-0x00000174DC740000-0x00000174DC741000-memory.dmp

    Filesize

    4KB

  • memory/1620-89-0x00000174DC740000-0x00000174DC741000-memory.dmp

    Filesize

    4KB

  • memory/1620-90-0x00000174DC740000-0x00000174DC741000-memory.dmp

    Filesize

    4KB

  • memory/1620-86-0x00000174DC740000-0x00000174DC741000-memory.dmp

    Filesize

    4KB

  • memory/1620-88-0x00000174DC740000-0x00000174DC741000-memory.dmp

    Filesize

    4KB

  • memory/1620-81-0x00000174DC740000-0x00000174DC741000-memory.dmp

    Filesize

    4KB

  • memory/1620-80-0x00000174DC740000-0x00000174DC741000-memory.dmp

    Filesize

    4KB

  • memory/1620-79-0x00000174DC740000-0x00000174DC741000-memory.dmp

    Filesize

    4KB

  • memory/3116-33-0x00007FFE8E9D0000-0x00007FFE8EBC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3116-32-0x00007FFE8E9D0000-0x00007FFE8EBC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3116-69-0x00007FFE8E9D0000-0x00007FFE8EBC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3116-31-0x00007FFE8E9D0000-0x00007FFE8EBC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3116-30-0x00007FFE8E9D0000-0x00007FFE8EBC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3116-34-0x00007FFE8E9D0000-0x00007FFE8EBC5000-memory.dmp

    Filesize

    2.0MB