Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11/01/2025, 06:51
Behavioral task
behavioral1
Sample
JaffaCakes118_fa07f8d1cf8d262fd06978103d1a5767.pdf
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_fa07f8d1cf8d262fd06978103d1a5767.pdf
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_fa07f8d1cf8d262fd06978103d1a5767.pdf
-
Size
102KB
-
MD5
fa07f8d1cf8d262fd06978103d1a5767
-
SHA1
95d0581a768690131cdbc13a79f5b35f6bbc8b07
-
SHA256
aaaf74260359ff89af918669a8eb715ad2a25ada1bafd09dbcb9b942ffed5aac
-
SHA512
664326aa092c8c3b6bf1bf566231317475e3af21b06258cad8bcd08aec08abc5eebab27d6ac587f6f9223d11a21717579d4496a293ab31583f67b24c4579df94
-
SSDEEP
3072:TUja9MrO6iMxaLl1r2in+8Oh0iZcwmTt176:4icxsrr2tSiW2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2580 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2580 AcroRd32.exe 2580 AcroRd32.exe 2580 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_fa07f8d1cf8d262fd06978103d1a5767.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e849fb55ffbe66c48969d3ed45215a8d
SHA11f7f350494afb4fc239fba004fae80b7b19d602d
SHA2564ff220db05adf7e261fef22892c6a7863e65928f150aa360341441f859d5882f
SHA51217ef78cee774c843d2856862b516c6855c5901fbedbbe508ddb78fcb2dd530d670920cf467d5090c702aa4a0c46e36b18d41cf200a0c67cd01b10fad95fcf8cc