Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
159s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 12:16
Behavioral task
behavioral1
Sample
fa46b00c7f89299419e069c6c3e9318b_JaffaCakes118.pdf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fa46b00c7f89299419e069c6c3e9318b_JaffaCakes118.pdf
Resource
win10v2004-20240226-en
General
-
Target
fa46b00c7f89299419e069c6c3e9318b_JaffaCakes118.pdf
-
Size
77KB
-
MD5
fa46b00c7f89299419e069c6c3e9318b
-
SHA1
9e88c3bc374fd288977705a40dea15cf537b324f
-
SHA256
0bc86a712767495f331fba738cb5223f4b7bf1679ce5cca33db6ee779cdb2049
-
SHA512
09b4f63e4d5429c57d154046218ee5df08b2e31c632f02dbba90808fdc4e6de1cfcb955e913827e02ad6f155e13176b42d7a9abef63bd71374ab0c3d76d60c64
-
SSDEEP
1536:n+EiRUfZAqGOOYC63b5JJnIWtdkjGpeIE0kxtWzgnftXwMkDutmWQpOCOAXm2iaE:+qAqDW63XBKjGkIELWgnftCutZCOMmp
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3484 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3484 AcroRd32.exe 3484 AcroRd32.exe 3484 AcroRd32.exe 3484 AcroRd32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3484 wrote to memory of 5100 3484 AcroRd32.exe 101 PID 3484 wrote to memory of 5100 3484 AcroRd32.exe 101 PID 3484 wrote to memory of 5100 3484 AcroRd32.exe 101 PID 3484 wrote to memory of 3076 3484 AcroRd32.exe 102 PID 3484 wrote to memory of 3076 3484 AcroRd32.exe 102 PID 3484 wrote to memory of 3076 3484 AcroRd32.exe 102
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\fa46b00c7f89299419e069c6c3e9318b_JaffaCakes118.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:5100
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3684 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:81⤵PID:3792