Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 19:07
Behavioral task
behavioral1
Sample
f5d1d70053426efc4b3dd92120202180N.pdf
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
f5d1d70053426efc4b3dd92120202180N.pdf
Resource
win10v2004-20240802-en
General
-
Target
f5d1d70053426efc4b3dd92120202180N.pdf
-
Size
141KB
-
MD5
f5d1d70053426efc4b3dd92120202180
-
SHA1
0788101dfe75223cf875d15253390ca09b253370
-
SHA256
2025319766ad03265e76b353d3d1caa58b7302161811838376e336445301f996
-
SHA512
89eba462eb25f3afb35ee9d79c8225cbe83e374d53574ca48c5d6e30c8d41d024aba999a24d06e0de38e2947b8f631e3c31360a3ad421f90d9ca715e87d6b1cc
-
SSDEEP
3072:0jHRi56CLq0NahjnvBmH7mCjZmfPsQ+oKuX03vJo5J:0jHRXyKjnvB+mPfUnoFOU
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2508 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2508 AcroRd32.exe 2508 AcroRd32.exe 2508 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\f5d1d70053426efc4b3dd92120202180N.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5924531270fd08d3a7409dd765cdf1421
SHA152cd247ee5d91eeba675e2d0fcd5f09e5ac48c01
SHA256f82e346f0ffb46204a4036159fb26a9caa33f68fce65043557532acd110c8828
SHA51241968e649c3668632f6964d16e4dd08cb4a2379248fc68013d662c06dc1b0a3dad503f13407cd8894a28111997497d26a4fffcc901ffdac3af1e98cea8181297