Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 04:41
Static task
static1
Behavioral task
behavioral1
Sample
2b054ccbd996f138ebf0f25b99493567_JaffaCakes118.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2b054ccbd996f138ebf0f25b99493567_JaffaCakes118.xls
Resource
win10v2004-20241007-en
General
-
Target
2b054ccbd996f138ebf0f25b99493567_JaffaCakes118.xls
-
Size
106KB
-
MD5
2b054ccbd996f138ebf0f25b99493567
-
SHA1
ac709136eb5c0f929834ca96b9f1820f0b5e2c35
-
SHA256
f52177837b0eaaf696030413951c34b2eb535fa7de721f0b93b4399a8048d8a3
-
SHA512
ba94a9c20f53eb239bbf0da5f40cc38a37614887121defe30cc3a233930d0e630101b4d35c45e310dfaf23557ad48b3fcd3e58e9cc181a5bb1f4065294d181ea
-
SSDEEP
1536:0RRR0SLElwMV3NxgxrFtT8jIW0zALoVZTcuWCOTY/C2jcc0lbxOvTgZJKOeXcJtv:gZC2jcc0lbxOrl/MJtXwKb
Malware Config
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3896 1312 cmd.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4752 1312 cmd.exe 82 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2740 1312 cmd.exe 82 -
Deletes itself 1 IoCs
pid Process 1312 EXCEL.EXE -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\8ED75E00\:Zone.Identifier:$DATA EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1312 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 1312 EXCEL.EXE 1312 EXCEL.EXE 1312 EXCEL.EXE 1312 EXCEL.EXE 1312 EXCEL.EXE 1312 EXCEL.EXE 1312 EXCEL.EXE 1312 EXCEL.EXE 1312 EXCEL.EXE 1312 EXCEL.EXE 1312 EXCEL.EXE 1312 EXCEL.EXE 1312 EXCEL.EXE 1312 EXCEL.EXE 1312 EXCEL.EXE 1312 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1312 wrote to memory of 2740 1312 EXCEL.EXE 89 PID 1312 wrote to memory of 2740 1312 EXCEL.EXE 89 PID 1312 wrote to memory of 4752 1312 EXCEL.EXE 90 PID 1312 wrote to memory of 4752 1312 EXCEL.EXE 90 PID 1312 wrote to memory of 3896 1312 EXCEL.EXE 91 PID 1312 wrote to memory of 3896 1312 EXCEL.EXE 91 PID 2740 wrote to memory of 460 2740 cmd.exe 95 PID 2740 wrote to memory of 460 2740 cmd.exe 95 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 460 attrib.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\2b054ccbd996f138ebf0f25b99493567_JaffaCakes118.xls"1⤵
- Deletes itself
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\system32\attrib.exeattrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"3⤵
- Views/modifies file attributes
PID:460
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
PID:4752
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c RD /S /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
PID:3896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144KB
MD581d69dcbeefcc94a38d006e815873fc7
SHA1c3f6f35621d0351ed97bed0b6deff11e92311cda
SHA256b493601528a8a83a993135a611f2edd43603f00c8359bde9d833a4a9e800db43
SHA5128e9aecefb4dfbc042913b638530e03fafa3f9c19710ccd56047e529ffd11dcbd24f3de5045f8b56e2a57133df39df6249785ec5e91d7d00a40a551be49d4b4af
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5d39c669947c492dc48cea31b1861f0b8
SHA1b8ca95b322b180854a137c98cc1522a27f0d3bc4
SHA25634d5b3d931622637f2a96c00439905549f468cdfc1f3bd58972ba478e35c8d6e
SHA512ef46494027fca8dfaa93031b20c5497115fc122c7fca291a2ae20914e6918999f522714eef0aba2c1238a5c86cdfa23b10231dded9e4322af64cb35975d6b3f2