Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 19:15
Behavioral task
behavioral1
Sample
419b835ac5968b634180b3537ac97410_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
419b835ac5968b634180b3537ac97410_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
419b835ac5968b634180b3537ac97410_JaffaCakes118.pdf
-
Size
84KB
-
MD5
419b835ac5968b634180b3537ac97410
-
SHA1
673d3d948e962092c094b757d1e2714ba8bc67fc
-
SHA256
22e68d7b65e04d05d9fdc205e7609aea542dc420a6f9695718be6077265d064a
-
SHA512
d3ebe0fdc61d06ee8dc3344408e93fd7313177136e6db11d90f695d569a717635071b5fed6034877e21d727b7dd420309fbd80697109503e36dbf19eb7a09a2a
-
SSDEEP
1536:y919BUZ8dL22NnMsdY4m3rKCtOsz9eoX85IyUDNMSdcW4hiSvGiMRygvSyaI2Xp:g9BFBGw+bpzzEx5y9dcW4hrvGiM0gKy6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1316 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1316 AcroRd32.exe 1316 AcroRd32.exe 1316 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\419b835ac5968b634180b3537ac97410_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1316
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58c3a2f730ba922d76bce16f424b856ad
SHA162d098ce97755eea4d149caca0b18a737ff89ad1
SHA2563a0bcdede36d51eabd4ef91f33135c35a115b5dbe1bb465de3ba465ce95a36b7
SHA512bcdcb4c28c47d188bac1e1a32747b20ed4298d2e700906a9b443af13afaba94ede0911b1688cd15af94dd26f1e3faff8c4522a06fa6f0b10144ccbafa5480e14