Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    133s
  • max time network
    112s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/10/2024, 22:49

General

  • Target

    26a13292b0f9442a0f02b18056d28816_JaffaCakes118.doc

  • Size

    32KB

  • MD5

    26a13292b0f9442a0f02b18056d28816

  • SHA1

    842b5a9f39ae2796c1ae57b83e39c464e60d7370

  • SHA256

    7a934f13a627cd9461ebd530413d5b5ffa74b471853c6ab34d0ee6c6ae0f02a1

  • SHA512

    164488887be2dc152d9bd6b134bc16fdc2c330e0003137cdeb71b7ecbac6b8916ba3d8e65743eb8645cab95705cbc8aa1a95363570e647e212334cc13658f2e1

  • SSDEEP

    384:fWR5Phe8rAOq30jD6KmKWcQrtq14yVWG:fWg/MDr1

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\26a13292b0f9442a0f02b18056d28816_JaffaCakes118.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3996

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCDE17A.tmp\sist02.xsl

    Filesize

    245KB

    MD5

    f883b260a8d67082ea895c14bf56dd56

    SHA1

    7954565c1f243d46ad3b1e2f1baf3281451fc14b

    SHA256

    ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

    SHA512

    d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    5c322069d0827ceff1c442850e7ccdfa

    SHA1

    6656004c493c2f0294b7e7384079649152678be5

    SHA256

    487bc4a29e54e2284ff9f1fda69623002e159f2bc81f3048c0ca025f039ec57f

    SHA512

    c1045c3318df400bf67bdb27593084a1a3d297b80e0d26196c5b4db7f857834eddbfb8dc2806b5ff10fa5f0d4e6f8860dcd453ec7c210eaf11c996193b4c13b8

  • memory/3996-9-0x00007FFA668F0000-0x00007FFA66AE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3996-8-0x00007FFA668F0000-0x00007FFA66AE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3996-5-0x00007FFA668F0000-0x00007FFA66AE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3996-6-0x00007FFA668F0000-0x00007FFA66AE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3996-7-0x00007FFA26970000-0x00007FFA26980000-memory.dmp

    Filesize

    64KB

  • memory/3996-4-0x00007FFA26970000-0x00007FFA26980000-memory.dmp

    Filesize

    64KB

  • memory/3996-11-0x00007FFA668F0000-0x00007FFA66AE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3996-10-0x00007FFA668F0000-0x00007FFA66AE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3996-0-0x00007FFA26970000-0x00007FFA26980000-memory.dmp

    Filesize

    64KB

  • memory/3996-2-0x00007FFA26970000-0x00007FFA26980000-memory.dmp

    Filesize

    64KB

  • memory/3996-12-0x00007FFA24880000-0x00007FFA24890000-memory.dmp

    Filesize

    64KB

  • memory/3996-13-0x00007FFA24880000-0x00007FFA24890000-memory.dmp

    Filesize

    64KB

  • memory/3996-24-0x00007FFA668F0000-0x00007FFA66AE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3996-25-0x00007FFA6698D000-0x00007FFA6698E000-memory.dmp

    Filesize

    4KB

  • memory/3996-26-0x00007FFA668F0000-0x00007FFA66AE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3996-27-0x00007FFA668F0000-0x00007FFA66AE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3996-3-0x00007FFA26970000-0x00007FFA26980000-memory.dmp

    Filesize

    64KB

  • memory/3996-1-0x00007FFA6698D000-0x00007FFA6698E000-memory.dmp

    Filesize

    4KB