Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11/01/2025, 06:42
Behavioral task
behavioral1
Sample
JaffaCakes118_f9ce2fc365e79dfdab4a2c6d69e1a44d.pdf
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_f9ce2fc365e79dfdab4a2c6d69e1a44d.pdf
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_f9ce2fc365e79dfdab4a2c6d69e1a44d.pdf
-
Size
49KB
-
MD5
f9ce2fc365e79dfdab4a2c6d69e1a44d
-
SHA1
0ea0ccd44615148e0d38e55548d01a74fd1de7f6
-
SHA256
e0ca69f6e2c468ab8af1c0db5659960fd3bc093ce6648ee5a22997cf73cc8174
-
SHA512
6b01b1ddab811f72beff405f636b78612086c465060c568c5efd2406ee0cc03fc9d82420bd24b2627c2c565071270531c94209f6f4c8f71c0991f0dc0480f71f
-
SSDEEP
768:k99AlN6Xzv8+rE/V7wl6fiENXye54OXCDMiOEtEI8DYqC6kRzkhpK6z93DN4:G93XrZrqwll2ye53uMTQQDCZRkzlzVN4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2564 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2564 AcroRd32.exe 2564 AcroRd32.exe 2564 AcroRd32.exe 2564 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f9ce2fc365e79dfdab4a2c6d69e1a44d.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD50776b0c2747363434fdc9e91a7ee15da
SHA1e7f5e4166ced404aaa135770cc92a2d8f1de7f66
SHA256ec772839ac8cfbf636944ff40b21cc19e90bb1edd502d0dfba8ff138d9c9edc4
SHA512a9747c356a791c7c056af92506eb35c3e809eb159174316ea62f80eed385e9014f9b305f08cdb6609b9ae96508919b7b540709c331357c6a93a986043ac7cf19