Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 22:07
Behavioral task
behavioral1
Sample
a867bfe5ff6a003aae00692593b5487c_JaffaCakes118.pdf
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a867bfe5ff6a003aae00692593b5487c_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
a867bfe5ff6a003aae00692593b5487c_JaffaCakes118.pdf
-
Size
79KB
-
MD5
a867bfe5ff6a003aae00692593b5487c
-
SHA1
9bccad788cc3b4efdee546951011f470dc86dfdb
-
SHA256
4d90a1a6172c16788aa4dc1100c2a5f0ffe31553ef4e0917a5c11bd6235e2f00
-
SHA512
86e9c76b06fee712a6bd59c509274f17710dfb09d5a01a0c717b130211001531fd524b49415279e10dd42656a0ea66db6db1461bf28146928cd23f540ee4ea02
-
SSDEEP
1536:BeC5l5clVER9H+0/Nh4coUlByE95nGSbESMewZym5FYC/l3ut5YAl:sC38VER9HlAco4z2SbCr5Fn/9ufl
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1656 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1656 AcroRd32.exe 1656 AcroRd32.exe 1656 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\a867bfe5ff6a003aae00692593b5487c_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ca6568be66f483d93a6237725665d699
SHA1b8706c486cb7e66b7d93153c1dc70fbf92e9852f
SHA2567debd0703c85c98f5e581cb0a046a30bb6e9a7a8206bbc570891c7dfdd93c298
SHA5126fe5b09458756a9be9969e6d065a30a8d6b1cffdcaab8da7e1bd8df9854a79f4a77a96b2023026fa3260f0897d4911b198eed2143c4fa7839f7f9b718e3958f2