Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 09:45
Behavioral task
behavioral1
Sample
2eed70e63662180d854e16e8b0a664ae_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2eed70e63662180d854e16e8b0a664ae_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
2eed70e63662180d854e16e8b0a664ae_JaffaCakes118.pdf
-
Size
72KB
-
MD5
2eed70e63662180d854e16e8b0a664ae
-
SHA1
f025950fbf3f440d617da8f70a40579c98e019d6
-
SHA256
0a4eb5e731debe4ec502df77bc314f72dd8586f025a31fbbd066b33e9bcf54f6
-
SHA512
37b741a6602bfc215895ae0a2d983a34a5b59bdcd41c59342ff3474878a7263ecbba583dae7faf8386627739309b3ae2b6b7fdaadb1c52342d758a572acd01ad
-
SSDEEP
1536:5pnJ3cO0XwL+sUcfzzsE7eah1W7QpcTIWzNQ7I+0W6pOu2OD4qyS2:NMTXqZdrzsE7eQWkmqftu2Oxy
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2692 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2692 AcroRd32.exe 2692 AcroRd32.exe 2692 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\2eed70e63662180d854e16e8b0a664ae_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e7ee194061cbcfacebb5b284abae4c67
SHA1eac06b446fd691af40bf4d7c62b8a39fb7a25f8f
SHA2565694577ab3e46f9db943a2574c4fc79af7fb19696ee88b11885df0c6633de942
SHA512c00f757013e6756f68ba052bcaf4d9d391931fabd64b15a392429be5f03f09cfd1d14996d77649c30208edddc3f97925402057aff7fa4188872007bae58b71da