Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
155s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 11:48
Behavioral task
behavioral1
Sample
1b2db941392168a530f357e27c2e7728_JaffaCakes118.pdf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1b2db941392168a530f357e27c2e7728_JaffaCakes118.pdf
Resource
win10v2004-20240226-en
General
-
Target
1b2db941392168a530f357e27c2e7728_JaffaCakes118.pdf
-
Size
81KB
-
MD5
1b2db941392168a530f357e27c2e7728
-
SHA1
bbbafee8398d9a4665371cf01ea9b6e3d378aa17
-
SHA256
c833b071ed49083381fe431b93c269e277bf1a6b0507d9c06c4f2f67d9c989ca
-
SHA512
af79e83a63ef1b963242f0b582a9e8459fa2df1a46cd770c2dc7b06618549e916135d6305690be2172b0c3409a627fb3f263969bebed7c9eed73dabb8d9bb937
-
SSDEEP
1536:d8AyioWdmhYeHCFYYpaF887Bu9v6Hx/Ea+WCpOViIWc9Ti8OfSqjucRmRa:2AyqmLIHoFhBCvqxtTVit3jXR1
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1596 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1596 AcroRd32.exe 1596 AcroRd32.exe 1596 AcroRd32.exe 1596 AcroRd32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1596 wrote to memory of 1284 1596 AcroRd32.exe 101 PID 1596 wrote to memory of 1284 1596 AcroRd32.exe 101 PID 1596 wrote to memory of 1284 1596 AcroRd32.exe 101
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\1b2db941392168a530f357e27c2e7728_JaffaCakes118.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4160 --field-trial-handle=3084,i,4016110471176367543,14287608422419064331,262144 --variations-seed-version /prefetch:81⤵PID:4304