Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
01/05/2024, 06:17
Static task
static1
Behavioral task
behavioral1
Sample
DHL Express shipment delivery doc pdf.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
DHL Express shipment delivery doc pdf.exe
Resource
win10v2004-20240226-en
General
-
Target
DHL Express shipment delivery doc pdf.exe
-
Size
1.2MB
-
MD5
f094676f389c05b6a2cd1a2bb1c3dc37
-
SHA1
2c74346628b07892f93abfa39f7afbead0176b82
-
SHA256
a6a70039baf8a4bd93003cd57d2a132c3b324e88a5b0b2c873147f44cd72c583
-
SHA512
dbf750bd27d04f0adf79e918df2d0688ccf3bb293471545901f9b71f43c12bb9f878cbbd0e4e63525ab218236c252ef93156c29e93a60e3651d6ba681ca2726b
-
SSDEEP
24576:wqDEvCTbMWu7rQYlBQcBiT6rprG8aIXi5r17FDIpy:wTvC/MTQYxsWR7aIS91ZIp
Malware Config
Signatures
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2468 set thread context of 2656 2468 DHL Express shipment delivery doc pdf.exe 28 PID 2656 set thread context of 1196 2656 svchost.exe 21 PID 2656 set thread context of 2392 2656 svchost.exe 29 PID 2392 set thread context of 1196 2392 HOSTNAME.EXE 21 -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2656 svchost.exe 2656 svchost.exe 2656 svchost.exe 2656 svchost.exe 2656 svchost.exe 2656 svchost.exe 2656 svchost.exe 2656 svchost.exe 2392 HOSTNAME.EXE 2392 HOSTNAME.EXE 2392 HOSTNAME.EXE 2392 HOSTNAME.EXE 2392 HOSTNAME.EXE 2392 HOSTNAME.EXE 2392 HOSTNAME.EXE 2392 HOSTNAME.EXE 2392 HOSTNAME.EXE 2392 HOSTNAME.EXE 2392 HOSTNAME.EXE 2392 HOSTNAME.EXE 2392 HOSTNAME.EXE 2392 HOSTNAME.EXE 2392 HOSTNAME.EXE 2392 HOSTNAME.EXE 2392 HOSTNAME.EXE 2392 HOSTNAME.EXE 2392 HOSTNAME.EXE 2392 HOSTNAME.EXE 2392 HOSTNAME.EXE 2392 HOSTNAME.EXE 2392 HOSTNAME.EXE 2392 HOSTNAME.EXE 2392 HOSTNAME.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2468 DHL Express shipment delivery doc pdf.exe 2656 svchost.exe 1196 Explorer.EXE 1196 Explorer.EXE 2392 HOSTNAME.EXE 2392 HOSTNAME.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2656 2468 DHL Express shipment delivery doc pdf.exe 28 PID 2468 wrote to memory of 2656 2468 DHL Express shipment delivery doc pdf.exe 28 PID 2468 wrote to memory of 2656 2468 DHL Express shipment delivery doc pdf.exe 28 PID 2468 wrote to memory of 2656 2468 DHL Express shipment delivery doc pdf.exe 28 PID 2468 wrote to memory of 2656 2468 DHL Express shipment delivery doc pdf.exe 28 PID 1196 wrote to memory of 2392 1196 Explorer.EXE 29 PID 1196 wrote to memory of 2392 1196 Explorer.EXE 29 PID 1196 wrote to memory of 2392 1196 Explorer.EXE 29 PID 1196 wrote to memory of 2392 1196 Explorer.EXE 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\DHL Express shipment delivery doc pdf.exe"C:\Users\Admin\AppData\Local\Temp\DHL Express shipment delivery doc pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\DHL Express shipment delivery doc pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2656
-
-
-
C:\Windows\SysWOW64\HOSTNAME.EXE"C:\Windows\SysWOW64\HOSTNAME.EXE"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2392
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
250KB
MD52d9766d456088aaf371165cc41d00fd2
SHA173bc7bed6d01c3209d5827bcb7067b4cde6821a1
SHA256d2ae296eb373e19647abefa91799dfb3f8269c04bcb3518c226d58cb88afcf60
SHA5126386f7a51b31b8017f63ff67cce893ad3e2df0b6f7004726ccb7b3b9b5b06b91ac67257c09a2665ef103732fec709de348dc530b2729eca32cf8fea8a29d313b