Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 04:15
Behavioral task
behavioral1
Sample
c24398224d7517c22bb6034572253805_JaffaCakes118.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c24398224d7517c22bb6034572253805_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
c24398224d7517c22bb6034572253805_JaffaCakes118.pdf
-
Size
35KB
-
MD5
c24398224d7517c22bb6034572253805
-
SHA1
3b9a8201c40fb74413588e7ed513af4a682476cf
-
SHA256
13b7f918cc543ece9c982a8d713b89a45629cfd3c01a01329edcbd9806f0a290
-
SHA512
4dda25d9e2a994950f6f507babf79c090450d84a12142c1a500316a5dc27782b67129b55347cd174cb4bfd2a1fa9ee66fb05dd51ae248a2b4f7d7e9429e49589
-
SSDEEP
768:igGzpDde0EFGdFR1Rg2N5KCPtfj2RlNNBQcsZARQbbvrjPMyyeJR:/GFhe0E8fjkNPQlZUyzjPKeJR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2260 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2260 AcroRd32.exe 2260 AcroRd32.exe 2260 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\c24398224d7517c22bb6034572253805_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5edd6687bbba196c7a2ed9306363fd836
SHA1f09d6b05e8bab871bfe1e0d75b155baa162465c6
SHA25604ff7690ebed79b3ba2056851f36be82e67cc417c6510554f205984371718791
SHA512ffcc7be3cb7e2cfddc0483538e402a8fc55abcf2b971611f8fa375b40361f6b693b316a4cf8747cc743fce39fc09cf28663fef794236381032a97140bc66b634