Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 22:34
Behavioral task
behavioral1
Sample
3c6034bf3f1706b22f4b1cc8ae5ecac0_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3c6034bf3f1706b22f4b1cc8ae5ecac0_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
3c6034bf3f1706b22f4b1cc8ae5ecac0_JaffaCakes118.pdf
-
Size
71KB
-
MD5
3c6034bf3f1706b22f4b1cc8ae5ecac0
-
SHA1
97b2bab3cba84297776d7097ad032fa24f6f9170
-
SHA256
770f9bd73a98f1a5b5cf383b63c2a793d11765dff5407c1136981e19298fff8f
-
SHA512
a3e4dfbc3759db362175493963144836628bba4e44a7bc4dbff4938c1df57a8a4fd8de802654043fceb81c54fc88da060194562e8481a1b3e01c3493efb070ba
-
SSDEEP
1536:A8T968pDKygyWR4roVeESF17zKmjzW24wIWjBZ77fiDWapOtQvtgGaKn:T3pDEyWR9AEM7GGwwzastQvtga
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1748 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1748 AcroRd32.exe 1748 AcroRd32.exe 1748 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\3c6034bf3f1706b22f4b1cc8ae5ecac0_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD54e2fc413bc77836fc82e4845acbd4219
SHA1d8fb66e62f7d8071cda23e7aea445ca5cfd01f94
SHA2565741afd63faf090e3ad6df9e9dc982e15e36ae4cfa2d99e70aea632b286306d7
SHA5122f115e10b4c0d6a69d01d28992a7772ec9bb2dcdc71f0120374fff34534044a1a3688a9c68308340b1684908eae45efd2077b59aa784e446c2e7b796de1ea650