Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
102s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/09/2024, 15:39
Static task
static1
Behavioral task
behavioral1
Sample
e725fdbb26a61f9f037406969f2618de_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e725fdbb26a61f9f037406969f2618de_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e725fdbb26a61f9f037406969f2618de_JaffaCakes118.exe
-
Size
816KB
-
MD5
e725fdbb26a61f9f037406969f2618de
-
SHA1
8c07c84296c35fd93ba0499856f12ee45128cf18
-
SHA256
5170180a716eaf47159bf537707410dfb75dc5e78fbc79e6697f393e2d7a208c
-
SHA512
0972faba8e0a230382ac3ac0fc832e658dece7b2f1774238e2e7525eb86fd4032fc7805844bca427fd6237c8b2502980cc58522aa236d91f05a9d5b15db9117a
-
SSDEEP
3072:hWe51vVRpJMFkstvxxrHA7ZFx+UMFQowJKfpThp+38uEEDUOIg:9st7rHA7xbMeLKDpKwpg
Malware Config
Extracted
metasploit
windows/download_exec
http://104.248.41.209:80/ZXq9
http://104.248.41.209:80/Oz1b
- headers User-Agent: Mozilla/5.0 (compatible, MSIE 11, Windows NT 6.3; Trident/7.0; rv:11.0) like Gecko
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 620 5048 rundll32.exe 81 -
Blocklisted process makes network request 1 IoCs
flow pid Process 28 620 rundll32.exe -
resource behavioral2/files/0x0008000000023422-26.dat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation e725fdbb26a61f9f037406969f2618de_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e725fdbb26a61f9f037406969f2618de_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings e725fdbb26a61f9f037406969f2618de_JaffaCakes118.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 5048 WINWORD.EXE 5048 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 5048 WINWORD.EXE 5048 WINWORD.EXE 5048 WINWORD.EXE 5048 WINWORD.EXE 5048 WINWORD.EXE 5048 WINWORD.EXE 5048 WINWORD.EXE 5048 WINWORD.EXE 5048 WINWORD.EXE 5048 WINWORD.EXE 5048 WINWORD.EXE 5048 WINWORD.EXE 5048 WINWORD.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4728 wrote to memory of 5048 4728 e725fdbb26a61f9f037406969f2618de_JaffaCakes118.exe 81 PID 4728 wrote to memory of 5048 4728 e725fdbb26a61f9f037406969f2618de_JaffaCakes118.exe 81 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88 PID 5048 wrote to memory of 620 5048 WINWORD.EXE 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\e725fdbb26a61f9f037406969f2618de_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e725fdbb26a61f9f037406969f2618de_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Documents\fundraiser_protected.docm" /o ""2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe3⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:620
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD551d32ee5bc7ab811041f799652d26e04
SHA1412193006aa3ef19e0a57e16acf86b830993024a
SHA2566230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA5125fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810
-
Filesize
85B
MD5d3d4e96e0dfa38bcdb4e1e49ea7a9702
SHA158d8123fba63691effd12116354b12044c568b1c
SHA2569d6a226852c0e28286d898363da730f9d4075fdcfc92a441a461a597916b73d2
SHA512215823a3c0971c12b8e54126945d861c66c2e27ace4cc0f4bf5d04ebdb33f4eb7aa5827f94dabea1d5b13a018a7682dc12eae9da08b8dbe28ae95d105efb9bfb
-
Filesize
18KB
MD502898a5df819403c72028285d8224731
SHA149c57a3f6a32927b49acda5df4a0e0704480e4e6
SHA2561ffefb04638452e3fa13c079fe7bc9a7252f7699f453e76c30496497898450d2
SHA5128b710027f428eb0c00804cc0de22e2ff5938b2a64f16dcc558acc43076d94ec6980ecb66d35d7f431839c68cac058358ddcae4174b6932e745a289b7e801c671
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize24B
MD54fcb2a3ee025e4a10d21e1b154873fe2
SHA157658e2fa594b7d0b99d02e041d0f3418e58856b
SHA25690bf6baa6f968a285f88620fbf91e1f5aa3e66e2bad50fd16f37913280ad8228
SHA5124e85d48db8c0ee5c4dd4149ab01d33e4224456c3f3e3b0101544a5ca87a0d74b3ccd8c0509650008e2abed65efd1e140b1e65ae5215ab32de6f6a49c9d3ec3ff
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize728B
MD5209f74af1529d01bc36d3973b62736e0
SHA1aed4fb616cd3079b1426ac85868f362756584f33
SHA256d1a61a13050809a3dbcc81f9eb4544e67774155af86d87306a837144737fda58
SHA5121cd4114a5aede0e5451b48a257e849285a8987b6831e9132503d02d6caa99530026375127248371aa66e66bbdc5e19d18878b88f6326da67190baa4be5de073b
-
Filesize
791KB
MD5154dd13d7480c3586911fe3295f1c169
SHA115266197d1ce2d261b60ce986e45ce62fccf6833
SHA256efbe0e787cd9676ed0500cb736038db5bf2d78fcf63d53f3fa7414447ce5fe40
SHA51207cdddf00a09302ea1e17c315d3af62dd93da7e8f70c892d71aecbd7cfb3ecb84882810e3ca8104c46b2e57d92ee42352b232bf2ff9bf4ee29cadfc2427d7f43