Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 02:57
Behavioral task
behavioral1
Sample
eef2356665811ddb0a619307ba6edd68_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eef2356665811ddb0a619307ba6edd68_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
eef2356665811ddb0a619307ba6edd68_JaffaCakes118.pdf
-
Size
96KB
-
MD5
eef2356665811ddb0a619307ba6edd68
-
SHA1
6e4f340d53412db1850e64df417801cda67cb911
-
SHA256
3c9bd0d1eb7bc235d2be68f3871fc4097a7ebb3682eeeed9cda0edbd1ed2eaa9
-
SHA512
1ca0fc7891b9bc094594fe5ac657ec4096d01523b5918ad3ab73126cc8241dd5f1aab6abacb159b7335318da6434fa37013eb837ceccfc33b742c4b8a18d0a3b
-
SSDEEP
3072:g29VLvYqhT0T8e5AYMu/VF+Gdl0+vUC0tR:g2zL2TtMu/VzFMCS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3068 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3068 AcroRd32.exe 3068 AcroRd32.exe 3068 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\eef2356665811ddb0a619307ba6edd68_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD566619ec321caea434215c2821933823c
SHA184a7c90151f2ff80374549e8fbb8f299e4b5877c
SHA25621be0a532891c2d87e49a3da0c1a407cb704a1b605ead26b253eb31a08be9ca6
SHA51231496d3601504edb6d83aacca85a7a0b1087e6031d57744fedfd1edb954b5781638acb81f3afe59b61bedb2b2d6c4d25b28b7f8a6adf7b86d81f957c0aeb5bf8