Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    27/07/2024, 12:01 UTC

General

  • Target

    78279cb3a4899a3affd193305f472b15_JaffaCakes118.pdf

  • Size

    15KB

  • MD5

    78279cb3a4899a3affd193305f472b15

  • SHA1

    fe48723ccb5ceca6598006f7402d79334c957f9d

  • SHA256

    24de51d7fc8af736443ddcc8fe1d2fee03a26bfb42c01b0a8a321dd64270d2ec

  • SHA512

    7cdd0ddd33d1e5c503cb13348ef06978b4f84cd055a0970d50bf27d152dc2820f946a6e0ef8d50f2e6012c227a3329ffbc6e5f3982c63a440cfe5b3b1b5b1ff7

  • SSDEEP

    384:YP5uqktVsBY2PEf4A7cQO2Uns+HStk9YoOcQJzmfbmINqkAIY9RpEBoY0:Ii4AgQLqxD9acQpmxAzp7

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\78279cb3a4899a3affd193305f472b15_JaffaCakes118.pdf"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2180

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    d7c98459622af354f8837c3676946f63

    SHA1

    4ff10e80ea30161ea1bbbb23ead08e492fecd69a

    SHA256

    e7c827fff49b2dd37c2aa6b46d16c833144e494fe32ee9c65d170db17e68ba55

    SHA512

    0d4a6bc64c2a39d0197d683212467ce3c6bea1328578652f13437ce4c4266e79840f1df75688efca828573b5525937a3a9538fac0d4db58aee72e64e64679a37

  • memory/2180-0-0x00000000025B0000-0x0000000002626000-memory.dmp

    Filesize

    472KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.