Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 06:34
Behavioral task
behavioral1
Sample
b26e9dda808d9e971093a3ef6835af67_JaffaCakes118.pdf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b26e9dda808d9e971093a3ef6835af67_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
b26e9dda808d9e971093a3ef6835af67_JaffaCakes118.pdf
-
Size
86KB
-
MD5
b26e9dda808d9e971093a3ef6835af67
-
SHA1
145393f40c2307d7d095efd95fd184395c303a2d
-
SHA256
67fac3129984e30ec5cf25b9c18f480d6833f88a509a7dca139418dbf7b5c1ae
-
SHA512
3010d9e8aa90910f24df2fd755ac3d2437ef62538a9e3f46cbbeb419436247d3603a07b00fd61c0388ed38d223d9ed5be4c3a4675ffe86069a4e9041f028a83e
-
SSDEEP
1536:e5hTHaqgbuOFGf+Fz7i8u4vKSt9qZ6OspDLRWOpOaZEWRURismlWbrYLc5:8HYRFGs7Ru4vpt9A6dpDLKaZ2ksmlurL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2708 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2708 AcroRd32.exe 2708 AcroRd32.exe 2708 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\b26e9dda808d9e971093a3ef6835af67_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD52294c6985969b278960f3808fe0cbec4
SHA13e7ead8be5e9c11b11760f972b1decbb5a5f7b0d
SHA2563cc9bef0366d2cc4bb3a6aff5a932f9ddcf9e3e2a0815a17349d1f32e5f095cf
SHA512d37cf92a461081231c00b276ba3e91ac8aba0fdc97a93571b07ff227cc11c58f0cee0b58d2da31599af78f66c74e598aa9388763ca4331aab4f1d8b0a78607b8