Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

08/09/2023, 10:15

230908-l9765sae7v 1

08/09/2023, 10:13

230908-l85pmaae6x 1

Analysis

  • max time kernel
    91s
  • max time network
    89s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2023, 10:13

General

  • Target

    6f465395-4e59-47a7-bad9-f1e98998accf.pdf

  • Size

    68B

  • MD5

    44d88612fea8a8f36de82e1278abb02f

  • SHA1

    3395856ce81f2b7382dee72602f798b642f14140

  • SHA256

    275a021bbfb6489e54d471899f7db9d1663fc695ec2fe2a2c4538aabf651fd0f

  • SHA512

    cc805d5fab1fd71a4ab352a9c533e65fb2d5b885518f4e565e68847223b8e6b85cb48f3afad842726d99239c9e36505c64b0dc9a061d9e507d833277ada336ab

Score
1/10

Malware Config

Signatures

  • Modifies registry class 63 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\6f465395-4e59-47a7-bad9-f1e98998accf.pdf"
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2840
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
    1⤵
      PID:2596

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

      Filesize

      3KB

      MD5

      dec20a9794413e229df459ce07cf4f52

      SHA1

      0f6b6295cb110d28187850218aeb7ee4d247aac3

      SHA256

      8d128bd2db14d0da162df3c134c1bf1b8d2bb51b113d09452f9e05e0be094c34

      SHA512

      13ab65c1fa36f22464b5ae6f30d94020e8c68d346d4e89bdd90b6e27a5b6845c1114d2b0a68b3975f590907228fef7c0edf1829eb2bf69a72a6857f381acea00

    • memory/2840-17-0x0000000000A80000-0x0000000000A82000-memory.dmp

      Filesize

      8KB