Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/04/2024, 12:14
Behavioral task
behavioral1
Sample
ff4015bf4a75a9e063d94faf61a2e3e1_JaffaCakes118.pdf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ff4015bf4a75a9e063d94faf61a2e3e1_JaffaCakes118.pdf
Resource
win10v2004-20240412-en
General
-
Target
ff4015bf4a75a9e063d94faf61a2e3e1_JaffaCakes118.pdf
-
Size
35KB
-
MD5
ff4015bf4a75a9e063d94faf61a2e3e1
-
SHA1
0923e89823ae1238710f5f30e0b777a8fda7ecc6
-
SHA256
4a19a153544c76c78a29fbc2a8cf2e64824ae39cf6d32efd6effe16c325f406e
-
SHA512
af92f277fd7d02b2ec9ea91f7e65f6c559b41a0981dccb0305ec9db62a5391a7812da4a4732436d77c0ecfe51ca81b642a79ff4efdc86cdd451ce0f2f11682ca
-
SSDEEP
768:RxwZRVxAeZsKWKnCuMkMitw6uPnXyWUwfWVN2lVyxW8l9qbJZvcX9Fu:RQRZWCDMkXSlyWuVAlVAl9qbJZvcXm
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 768 1976 WerFault.exe 27 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1976 AcroRd32.exe 1976 AcroRd32.exe 1976 AcroRd32.exe 1976 AcroRd32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1976 wrote to memory of 768 1976 AcroRd32.exe 28 PID 1976 wrote to memory of 768 1976 AcroRd32.exe 28 PID 1976 wrote to memory of 768 1976 AcroRd32.exe 28 PID 1976 wrote to memory of 768 1976 AcroRd32.exe 28
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ff4015bf4a75a9e063d94faf61a2e3e1_JaffaCakes118.pdf"1⤵
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 11442⤵
- Program crash
PID:768
-