Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 17:35
Behavioral task
behavioral1
Sample
412f17c2bd77f9670bad097ff2709893_JaffaCakes118.pdf
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
412f17c2bd77f9670bad097ff2709893_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
412f17c2bd77f9670bad097ff2709893_JaffaCakes118.pdf
-
Size
89KB
-
MD5
412f17c2bd77f9670bad097ff2709893
-
SHA1
7a2d3309227b2153ef4a60a877b118e8d614b35e
-
SHA256
62242970e038de855a35443adca2294259324b8a834496ec2c036295fa800b01
-
SHA512
a36bc4793e0f131d37425d9991200d7ac63275291f8b8cc12d491e3fcdb1d9a3d6d1481c70c1a0ff93ab66f09e684f563865be8be9c358b0b2af1d50cd4352dd
-
SSDEEP
1536:Vf1vPsEINvLgLr5zgFXvV9ZiMOLnGxDQvu5s8WB2vON5j2PKZNEPywWUpO7L12:zXsEGDgLVzcVXz+Ca0PKZNsyz7U
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2652 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2652 AcroRd32.exe 2652 AcroRd32.exe 2652 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\412f17c2bd77f9670bad097ff2709893_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD507c1df4e572f8d60df81a1eb77d10a3b
SHA13c56a01d5aff99618c151a93d9fe08d6141f6320
SHA256a8881e1456f3b7f50fdf2bd256265acbf186923bc2e3734ce406f1c65ce0bad9
SHA51291acf82a5eab2216b736d652a54f0502d33bc19ecd10e5c07c7765af3fbe6a49397ac8f80249a7923376445495fd097d1f543a09c79ceb70d07f0c9497e7508b