Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/09/2024, 11:03
Static task
static1
Behavioral task
behavioral1
Sample
467c43d879bff26ac8a94b2adec4d9a0N.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
467c43d879bff26ac8a94b2adec4d9a0N.pdf
Resource
win10v2004-20240802-en
General
-
Target
467c43d879bff26ac8a94b2adec4d9a0N.pdf
-
Size
72KB
-
MD5
467c43d879bff26ac8a94b2adec4d9a0
-
SHA1
13b5e80089379e9c440aab3e757308cbd70d3818
-
SHA256
a0824cac98b1448cfc97dda1bd0a0c83c497214818a141fa933b3d4b4cd11dc3
-
SHA512
2cbd9eaaf83bd64fa7949c03397e3274169f3a68e053eb9d4a2f2e70be3bb3fc45f4ab3371cffc5186f7bc708b95f46ee088718b9460ebcef6f596cd0283b1f7
-
SSDEEP
1536:+PGF+ufHTdnKX+JDAdfscTTxsI8crcNh41UDSd:2GF+ubdnKrFf5sjGf1Bd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2092 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2092 AcroRd32.exe 2092 AcroRd32.exe 2092 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\467c43d879bff26ac8a94b2adec4d9a0N.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5614d285e96880b222b84f763b020f143
SHA1527103d0782afd257d4c3aff7d580a3fdcee4183
SHA256fb2f01d5274794ea0bf99c0c245fd17ec318806d865de63e28a1236f0efb1a17
SHA512eb036393b2a316da03e91f75a09bb0e40920f4beaaac0aef62aabf95f8f536badc294c04ba1c573cfb8a773aa6cfe6c618ea6e140dbf119328647d7451ca1ec5