Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 11:54
Behavioral task
behavioral1
Sample
d6428a239a158c149e3dc7ac4e495d11_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6428a239a158c149e3dc7ac4e495d11_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
d6428a239a158c149e3dc7ac4e495d11_JaffaCakes118.pdf
-
Size
43KB
-
MD5
d6428a239a158c149e3dc7ac4e495d11
-
SHA1
6d5d77930ad2f88664bf427f0c09e80294999c3e
-
SHA256
2e04ae17baea405ffdf2fc4440a2ad792687441e07e43cf0cdd5b876cfaf5951
-
SHA512
80a0b13e1f3d422b139e63fdefa25ae6d5035e3b3c506c795301c66b16fbae142233d4a60013cd410f162483830cd3cda0e9dc100ffbf5f666a7b8cbbe660c83
-
SSDEEP
768:cdvyvjIFnQ5w/OXJI9xbrozbxRXRyeZ6E+42fUEbncmTLHZbJKAyaOC4n7o4j:4+jzJXJI9xbronxGl42fUE7cIVKN3C4L
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2704 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2704 AcroRd32.exe 2704 AcroRd32.exe 2704 AcroRd32.exe 2704 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\d6428a239a158c149e3dc7ac4e495d11_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD583e2d24253e977f4c3e797c8a3a130e6
SHA1f5cd6c446d792d4686c29555af0e28e6355e058d
SHA256fe90afb9ccebd9abb5a89dba82ef400d6e409f3c47071293c0442bb942d46c3a
SHA512f2d325d94330983cce70b88cf87ef4cfa85213d58b78b696432de71a44ef4d4bff990d4832f07d646686877bd6e9a490a4f3a38b7bf17b9906b2df7f658f2232