Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 05:01
Behavioral task
behavioral1
Sample
f9c2b4aaf56d8935c3ee607f50109493_JaffaCakes118.pdf
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f9c2b4aaf56d8935c3ee607f50109493_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
f9c2b4aaf56d8935c3ee607f50109493_JaffaCakes118.pdf
-
Size
76KB
-
MD5
f9c2b4aaf56d8935c3ee607f50109493
-
SHA1
6e06798b11fecfa890b2af9188f4ea3c75f96339
-
SHA256
556dfdd07af61b2d034063c0073fa030e7e287d570855e60d2a9c9c680ff8016
-
SHA512
5d89eb6e4b30dccf717a5fa64d47a255ea888186048cec1473599f35b65e16069a6d745cbf32a7d29d6d566938f24545be83fdccd1d419296fe9e2173f1b6350
-
SSDEEP
1536:InYN8R9llynNCq8CesXU7oC/i0Wdnm4lXUaLfTO+WYpOem7nX:CYN8R9imJCU7l6RnlUaeFei
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 528 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 528 AcroRd32.exe 528 AcroRd32.exe 528 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\f9c2b4aaf56d8935c3ee607f50109493_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD583bd9847db46e4c496b508ea20ccf75b
SHA128009df03cecbefb25bab061ce158f65709d968b
SHA25645e73d64f20e715b2d21c27ba34a2627efccb4020d12d05400d1d8d2ae20dca6
SHA512f43dd3a56c1d45b17f6d05956dc5979888df2aafd416914f31e3edab9082c60758ff43bc403cf6c33be21d2f8435581e04ae1637d7ff4e7c23372d1d4602e450