Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 13:24
Behavioral task
behavioral1
Sample
af64b1dbdb9df2c05d715d271c75f6bc_JaffaCakes118.pdf
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
af64b1dbdb9df2c05d715d271c75f6bc_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
af64b1dbdb9df2c05d715d271c75f6bc_JaffaCakes118.pdf
-
Size
12KB
-
MD5
af64b1dbdb9df2c05d715d271c75f6bc
-
SHA1
ed74f60ff3bdb68c8ea4c43873d14e3aa9da9143
-
SHA256
3e00377a334269bf4c86832f5faf70e5b615d888091df8b13afd24c8858e2d64
-
SHA512
c53394576f1758cc135ae3bd58c59e77eca9a6076bc30ad947bce7f2f85734cbeafe1e4f1279e29fd7b0f9001eb8b0f9076f6bafe1882d78de8e23eccb8b49d6
-
SSDEEP
384:WysNmWh0O0UErx7olNPslxHK9Avh5CsIqkOAOM9RP4E+:pIEY8d
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2656 AcroRd32.exe 2656 AcroRd32.exe 2656 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\af64b1dbdb9df2c05d715d271c75f6bc_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2656