Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/10/2024, 22:49
Static task
static1
Behavioral task
behavioral1
Sample
26a13292b0f9442a0f02b18056d28816_JaffaCakes118.doc
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
26a13292b0f9442a0f02b18056d28816_JaffaCakes118.doc
Resource
win10v2004-20241007-en
General
-
Target
26a13292b0f9442a0f02b18056d28816_JaffaCakes118.doc
-
Size
32KB
-
MD5
26a13292b0f9442a0f02b18056d28816
-
SHA1
842b5a9f39ae2796c1ae57b83e39c464e60d7370
-
SHA256
7a934f13a627cd9461ebd530413d5b5ffa74b471853c6ab34d0ee6c6ae0f02a1
-
SHA512
164488887be2dc152d9bd6b134bc16fdc2c330e0003137cdeb71b7ecbac6b8916ba3d8e65743eb8645cab95705cbc8aa1a95363570e647e212334cc13658f2e1
-
SSDEEP
384:fWR5Phe8rAOq30jD6KmKWcQrtq14yVWG:fWg/MDr1
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 744 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 744 WINWORD.EXE 744 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 744 wrote to memory of 2868 744 WINWORD.EXE 32 PID 744 wrote to memory of 2868 744 WINWORD.EXE 32 PID 744 wrote to memory of 2868 744 WINWORD.EXE 32 PID 744 wrote to memory of 2868 744 WINWORD.EXE 32
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\26a13292b0f9442a0f02b18056d28816_JaffaCakes118.doc"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2868
-