Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 10:59
Behavioral task
behavioral1
Sample
f5dc5ea6cc7ca2417ddb9410fbc0515a_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5dc5ea6cc7ca2417ddb9410fbc0515a_JaffaCakes118.pdf
Resource
win10v2004-20240910-en
General
-
Target
f5dc5ea6cc7ca2417ddb9410fbc0515a_JaffaCakes118.pdf
-
Size
41KB
-
MD5
f5dc5ea6cc7ca2417ddb9410fbc0515a
-
SHA1
0666eaeec6ab85662b2492605ab0d6e80bd1d2bf
-
SHA256
f7b907481dc8037aef8b6e98f76d463d69d0589367e40f9f2f95ef27b9998bb3
-
SHA512
2ecd2ec796c8fcd5a05ef64d67a8336848cadc5541c983c74b84debd6dfe57918b54ac0199c7cc56c7b6982f9fa37239a834b3ddbd44ced863ded376d1d7f440
-
SSDEEP
768:UgGzpDwppGnmMkSvKv9KZmqFRGfaoLWV0fs8dx/+r+EOO3u8dSnXak75OmCXy26:hGF8pw1Rs7tEv3Xkl6y26
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2976 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2976 AcroRd32.exe 2976 AcroRd32.exe 2976 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\f5dc5ea6cc7ca2417ddb9410fbc0515a_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5989fe67de474d9448a390b393da049b6
SHA11d45d53d481318eb7a021d2c0d5384cb914ecada
SHA2565f4660cd2db6189b20087db9de60a64fb558688f6e26594ac9fc6a32f6225eef
SHA512b305744b4fabe567fe7374e948964513dcee11f7bc6b08552e3e2f6805dc4f5a175e6de7593916971885bff0ad3d00a6c1d80d8b5c5dedbc276fb31bdcfa6052