Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    10/08/2024, 19:41

General

  • Target

    87665d79a122d842e1fad56431d97986_JaffaCakes118.pdf

  • Size

    7KB

  • MD5

    87665d79a122d842e1fad56431d97986

  • SHA1

    bbdf64a3abe07bd3712a8db1054eabe74dc152b9

  • SHA256

    5ea2a45d2fb64cd0d535888147d373a9a9cb12cc09fbab21e1d154bc256650e9

  • SHA512

    181f04dc21595915c920c78e9910a9909d71a15e68fadcdfbc0fb5a16901984c1d935627f2a41d51602620867f682d09eb5a2d67a1872970cc32f8929d1e0adc

  • SSDEEP

    192:GP5u7kXpjEx8qwtc1TIdVngr1C/d402BtFPy8JnNCUotftVOGftiqYP:GP5u7kX1Ex8zYcdO0/d40ktfi3tftVO9

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\87665d79a122d842e1fad56431d97986_JaffaCakes118.pdf"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    79ae10099058ab07c469fd298954790f

    SHA1

    ff07dd09f420245531e4ea7533a0c7870c0b92dd

    SHA256

    1acbb8fd60b62d81ad0631699b2487263a88b71d787ba3dacb992150ca73331f

    SHA512

    b93bed14a062d2d6375b07cdc9638b0a79b7c6b41b04ac64ac6937122e79ccaf480c9a5379dc8a9d5be59722d8dcff6070c503a79b8891200db82e1c194c1508

  • memory/2068-0-0x0000000003270000-0x00000000032E6000-memory.dmp

    Filesize

    472KB