Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 01:41
Behavioral task
behavioral1
Sample
8cd093e6e1da59efa4aa3d43619bb621_JaffaCakes118.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8cd093e6e1da59efa4aa3d43619bb621_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
8cd093e6e1da59efa4aa3d43619bb621_JaffaCakes118.pdf
-
Size
111KB
-
MD5
8cd093e6e1da59efa4aa3d43619bb621
-
SHA1
ed685ad050c002ac77c84522a34c23fd6579c250
-
SHA256
444ce8dc0b6e4d4f7e09b57135c464d74cfec762764755babd7b9ef9a0d633e7
-
SHA512
dd5ebd47f6de89842d90c496299233c783f5b5c5ccf58c922f06e7080b5cd8e07b8e449c560fbc5905d1880c96b805791154a70fabee9f156aa20a73ebc0fc28
-
SSDEEP
768:Z/iWZSVsV1YPveYmYGbLB/vbQNK775BoQ4mijVJipEhiD6T+bIxp0sO9PGVigGZw:+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1812 AcroRd32.exe 1812 AcroRd32.exe 1812 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\8cd093e6e1da59efa4aa3d43619bb621_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1812