Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 23:33
Behavioral task
behavioral1
Sample
df18d55df83ca9e5e920601a8644089c_JaffaCakes118.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df18d55df83ca9e5e920601a8644089c_JaffaCakes118.doc
Resource
win10v2004-20240802-en
General
-
Target
df18d55df83ca9e5e920601a8644089c_JaffaCakes118.doc
-
Size
175KB
-
MD5
df18d55df83ca9e5e920601a8644089c
-
SHA1
fc3040b53bbf45a9b827edcf1e1559c0dc533c35
-
SHA256
c092f05922884dda96ae97cbd4357a0917ed9645757f8414e0b4e5128ea800b0
-
SHA512
64b6495d2008cea42a7fdcea494d90cce0721abb73e6b5f7f5420af10286de40a8188a302cfa39f2b33e8316030c8e4506643fc5400ed4487cbe30e119263d4e
-
SSDEEP
3072:HrePreprDCdFoBjRa0k791NA5gHSmOulyFUK7Ux7JxNsh:HrmruCdFd5mKHSmO1FL7Ux7JxNsh
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2068 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2068 WINWORD.EXE 2068 WINWORD.EXE 2068 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2796 2068 WINWORD.EXE 30 PID 2068 wrote to memory of 2796 2068 WINWORD.EXE 30 PID 2068 wrote to memory of 2796 2068 WINWORD.EXE 30 PID 2068 wrote to memory of 2796 2068 WINWORD.EXE 30
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\df18d55df83ca9e5e920601a8644089c_JaffaCakes118.doc"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD5770fc64738d970705bf1b49f67e009b4
SHA1c3f278eee78e835c8bd5760b947e779cb7c35232
SHA256cebbc5b86b1b0fa3ff988ee0d19856708e38e0c6edc862c1121e8d8cfa238740
SHA512570dca4a0fd6fe36ee37f2ea5a658d8fdfe2bc65f6778fc31b0da30186e34b45e36a00a22a7d7f7383ae8f85e865dda8297f93029b4def3234178f40315ab1c3