Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 06:50
Behavioral task
behavioral1
Sample
3e66fd5dd262aa38e7f64fecd5536b6a_JaffaCakes118.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3e66fd5dd262aa38e7f64fecd5536b6a_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
3e66fd5dd262aa38e7f64fecd5536b6a_JaffaCakes118.pdf
-
Size
87KB
-
MD5
3e66fd5dd262aa38e7f64fecd5536b6a
-
SHA1
1afcbe8ae6a8fd42b740a08ee808e8a9c5ac1676
-
SHA256
b2705ed5c0e51f4cf7641430535541f07e5c1729a05358bc76d7e106e2fe3cdd
-
SHA512
b963c614e59137072bd28c7b61a7c99e56d853100867ee157778643ce43f66ae31744710b39b6e869ebbee4818a2ab19dd9e4d618cd5abd5fd176e9c0a3aca78
-
SSDEEP
1536:9wpDwKy4hz7oJBzbPekZzJRJ7slhWUvITZt+nx69MWrfJfvrfAmfLgWApO6+Jv:+pDTy4hoJtqkxLBslhIuE9XJMmfLf6q
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1452 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1452 AcroRd32.exe 1452 AcroRd32.exe 1452 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\3e66fd5dd262aa38e7f64fecd5536b6a_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD54a1abf4c0daabe810ecec771e574e506
SHA1b745c6adbc5fe6a74a71d1598a4c040cb01f41ba
SHA2562dc4508938eb16236f7bc443c5ce440ba494f3752e0c9bf38f17ed781a19e739
SHA512f6cc58d1a09ebeac64870e4388de572bd352282f055433ca61cf9d2bf2fc677f99072bb80efaadf41104c7b205cd72fe354b1e308f965c6bfce3977f1df1ef09