Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/08/2024, 19:37 UTC
Behavioral task
behavioral1
Sample
9473a0da7b3d58125afe66a3714b9564_JaffaCakes118.pdf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9473a0da7b3d58125afe66a3714b9564_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
9473a0da7b3d58125afe66a3714b9564_JaffaCakes118.pdf
-
Size
3KB
-
MD5
9473a0da7b3d58125afe66a3714b9564
-
SHA1
e19f6a3924651dc05cd0ff03feb0bcc00ad6058f
-
SHA256
c0a61c43c1abfd7d30c87019f2e3a0fd27bbb7699c88fbe4246b4ed080918610
-
SHA512
27a3d573d2d67bf67c635d844a3b6b2821a6d5fd93dbc9f0b65b766704f7e33b9928c87d424287f5a0619a6703016e35749e0bc8db4265f7d543e1c0a6f10f00
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2584 2388 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2388 AcroRd32.exe 2388 AcroRd32.exe 2388 AcroRd32.exe 2388 AcroRd32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2584 2388 AcroRd32.exe 29 PID 2388 wrote to memory of 2584 2388 AcroRd32.exe 29 PID 2388 wrote to memory of 2584 2388 AcroRd32.exe 29 PID 2388 wrote to memory of 2584 2388 AcroRd32.exe 29
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\9473a0da7b3d58125afe66a3714b9564_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 7682⤵
- Program crash
PID:2584
-