Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 03:56
Behavioral task
behavioral1
Sample
2a65e3532fc893981e03880318484d58_JaffaCakes118.pdf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2a65e3532fc893981e03880318484d58_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
2a65e3532fc893981e03880318484d58_JaffaCakes118.pdf
-
Size
110KB
-
MD5
2a65e3532fc893981e03880318484d58
-
SHA1
9b25de3ea266c758328196511e933c03dae5a686
-
SHA256
e34b65a901f178603ff6f6f93d4e807fff0d9be0bda190c68ada79b2e30d2292
-
SHA512
b3bbefe395438cd17243359b0700369c052486f852a9ffa5432fb7e9828f2c3c4c1fb46cbf2500ab5df9e04b57fe871d21b1764aeac193c8e7e2bed652e699c6
-
SSDEEP
3072:UwK6LGdG3g8a5UN0cHEuuTRqwb6yFs4SJeoSamuYi01kHCw1:UvDkQoEuK0wOyKJD1Xh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2520 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2520 AcroRd32.exe 2520 AcroRd32.exe 2520 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\2a65e3532fc893981e03880318484d58_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a187a3c8f7369eab7bbe4a6e51b58e96
SHA1daf7ad0b51d15b5e4dda2260f96e6371dd9d3b29
SHA256481d61d96d5702a1ca7427ce94724340d61557e79c4862d429466c0b33be078c
SHA5123e0e8dc9fb711651bb41962728e005d1fc34c495fac102445dc951c4a43aa9e7bfdfb4839414b7bd849052ff30f267197bc6e2680b69836cf3320e74f5d2433b