Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 07:49
Behavioral task
behavioral1
Sample
c046f006698905bd257fe570c0f3f736_JaffaCakes118.pdf
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c046f006698905bd257fe570c0f3f736_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
c046f006698905bd257fe570c0f3f736_JaffaCakes118.pdf
-
Size
40KB
-
MD5
c046f006698905bd257fe570c0f3f736
-
SHA1
c15980df992dca530b6d79304ebfce80a7bf3184
-
SHA256
5c7699b24a355fcbe877dd551e33e966535d7169e1508ae8cc5512b06d3cb30d
-
SHA512
7a08c17ad7ca9a4079907b74f48bdfa0e974d78b64060cbd415c24c08f38cf00bb8d8abcdc70ed8afd8835fb9bb79e53d43f2624faf02ae890b7ea7d40f21d25
-
SSDEEP
768:YgGzpDon+1pP1R3rHz2vfntp8RA1qa7vS5wkUNx9QTPmq+:1GFUO3ot+AbvSmbETJ+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2296 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2296 AcroRd32.exe 2296 AcroRd32.exe 2296 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\c046f006698905bd257fe570c0f3f736_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5d6fb813dc0ae584eebf6d416b880e608
SHA1b1e3d0eb368b8e541e9269132158e2a2d059cc3f
SHA256d53a9258152bc8c57024a2349e761053967148071d279dcd3fee1620ced73eb6
SHA51263a3ef573b460223dcfd2fae7b2aa0ed43c44619ebae85be79150b55eaca4705f45cd5a6cb3a9dd01f657e6c202611f3e22b9d6904dad4dce3152fba0d0b2606