Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 00:11
Behavioral task
behavioral1
Sample
db78bd50a45bda9d6d7a432bdd6d5103_JaffaCakes118.pdf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
db78bd50a45bda9d6d7a432bdd6d5103_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
db78bd50a45bda9d6d7a432bdd6d5103_JaffaCakes118.pdf
-
Size
36KB
-
MD5
db78bd50a45bda9d6d7a432bdd6d5103
-
SHA1
24f73abae2c0180d12b9e46f16180fff5194beb8
-
SHA256
f839092e9f32c0b6834190766247e5b084daa536dd3790472db9e1e4fdd685d6
-
SHA512
1f41602a89f402059bddb8d5ccd20ec1e3b6149767c981b855eb479a4f16bd46c91e9f1860949700d1168d9f26283c62bd69bae38428eccde85c2919ad0b5f6f
-
SSDEEP
768:vXuMZmwgCLWarjngipdmWDfduUglTbHS/m7RBWx6Myw:vXFZmGWSjHmWLduUg1bQmvWx6Myw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1952 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1952 AcroRd32.exe 1952 AcroRd32.exe 1952 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\db78bd50a45bda9d6d7a432bdd6d5103_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD50623a62ce17c17ccdaf950e4ee9c4f1c
SHA15c28843eb5d4771cbd2d96ed554f73e62f78fee0
SHA2566bc0865c882a91da12e1bc9600e98384adfa59ad7b70cdcb1905f62eba44731d
SHA5123383792057916835b46b10f94a14dcdf83ab8853ee66b82ebd8c176b0f1cb7a3ec4e048c678fa05c2f5c09457bd0a0047cdd2423ad334a9441bf7061edd2ca32