Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 11:00
Behavioral task
behavioral1
Sample
b7619cae634d88ae4372e5b7e6bffaa5_JaffaCakes118.pdf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b7619cae634d88ae4372e5b7e6bffaa5_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
b7619cae634d88ae4372e5b7e6bffaa5_JaffaCakes118.pdf
-
Size
81KB
-
MD5
b7619cae634d88ae4372e5b7e6bffaa5
-
SHA1
31a300597ccbba51715fd2880d0afdb302e66c3f
-
SHA256
3b01e99cc63b2b48f453176a02cd0f74b3c304d4b3d8f7e73a35f645874ffd39
-
SHA512
168d67c21821f923700d3999806ba002dbc03c5b39e54be9fdf8a621d0bca7c4c551f9ff56b75ef5c03b2b9f2cb6f828581ec989999012db309941136c539f38
-
SSDEEP
1536:wCl0r58KwMCAcld5ds6b779nA4rTDmWirE2MqdG0WxApOG+4xFVu4M5:nHMCAcld/s6b9nAeAr4zV3G+u+v
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2436 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2436 AcroRd32.exe 2436 AcroRd32.exe 2436 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\b7619cae634d88ae4372e5b7e6bffaa5_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD56873a4a0c3cece2f1af5e3972f7b0221
SHA1b1ab2e2d41d0acbf851f47d209d740d530d7aaf3
SHA2567ffaef3c5672c3a86efc4de64445fb548dacc2ed37388ac438875030c8f83aa1
SHA512e757d9ec79467c0ad669ef894d3dbdc3a5e27f00f57ff63086fabb85745bb3372da3e30bb23333731f5b7cd0b4dbe296b61e3079f9f87aa14187196421206ae0