Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    10/08/2024, 22:06

General

  • Target

    87db953c98c3e5066979ab47e46e6181_JaffaCakes118.pdf

  • Size

    8KB

  • MD5

    87db953c98c3e5066979ab47e46e6181

  • SHA1

    4185697875e7d96f6ea2a83d1a17fe17010e6a53

  • SHA256

    f368813163fb9ecda49884f4b906fa9e073f50ecbc2e7fcbc56e2952e73dd830

  • SHA512

    c41cd4d54d8080e545bea211b11a539287e1634c2fdcf67eb0142e23e74474ce95960ae4fc1d75481d1b834fde0bc2c303e1c45941e8074a9e4fbf721e377690

  • SSDEEP

    192:ZP5uFm4kAGdwGp2Ue01I4hENYPu9f1q12B0Rjeih8HtdjMKYP:ZP5uFm4kAGdJp2iIuEiPuXbBoP8HtZv4

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\87db953c98c3e5066979ab47e46e6181_JaffaCakes118.pdf"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2352

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    48adfc5c6d970782d37ee3642413b279

    SHA1

    7c72f2fde62f31ae9fcd8f8b43a774934ec42832

    SHA256

    1d473626da5da2b79daeaf88bd6472fa336350c4d52253c4f01b8187d8017bc9

    SHA512

    0cf6bb5e8e3f33054d4eb00062088d9f5977efef3cfe5e73e676a2833f937377db94398c46f15f2b0efa5b814f2f481750bb94169cf595191173ef96d83980ab

  • memory/2352-0-0x0000000002FE0000-0x0000000003056000-memory.dmp

    Filesize

    472KB