Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
96s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 08:03
Behavioral task
behavioral1
Sample
d5eb106f03cccbb174161e65f95cc760_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5eb106f03cccbb174161e65f95cc760_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
d5eb106f03cccbb174161e65f95cc760_JaffaCakes118.pdf
-
Size
83KB
-
MD5
d5eb106f03cccbb174161e65f95cc760
-
SHA1
b600eaccc3f2136eeb47d1c0112962f246733609
-
SHA256
d4b30bd2c6e13b9cfd7209cd1430b5f05e78d08edc90f9898ede315e241b4b74
-
SHA512
41335d28647448b6bd2763ab76f08a1892a43aeefaad1c344539cf0d31e896fed1190f437a7180c7afb16b1041c3b3e413fdd33c57f9251116c102f5c28a61e0
-
SSDEEP
1536:RS5LKPeHqG7sSzGFTDQ4lJXYr3dbsHeXeWQrwHWepOyWWHh2KB4TeebUeBH3X:suPeHp/GlQ4lRaoHeXzQrwky72KYZDJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1956 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1956 AcroRd32.exe 1956 AcroRd32.exe 1956 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\d5eb106f03cccbb174161e65f95cc760_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53e97e8c89122375dbf780242d395b242
SHA141597d1d1af5001d6a3c865cf4127b22b26be847
SHA256f3b3a54c86e117ba13af343d9c609f9e3b7a6e8c2ad9da64fb2d5b768f737efa
SHA5121e786c3d5e6837824484889e540f1124ee0803f28b5a5c8fc83bf12f70a868ff694bbe164d735052f8b4337af7dbad3a097eb8539672c7d2f7007f52c4be8377