Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 11:02
Static task
static1
Behavioral task
behavioral1
Sample
57a684e94d6c944c1b2b9199877f5280N.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
57a684e94d6c944c1b2b9199877f5280N.pdf
Resource
win10v2004-20240802-en
General
-
Target
57a684e94d6c944c1b2b9199877f5280N.pdf
-
Size
649KB
-
MD5
57a684e94d6c944c1b2b9199877f5280
-
SHA1
b50053dcb1ae991efe0c1b5ec4c8b35aedfc0e78
-
SHA256
d7e31d76ce1d232d61b28360916f392b9b7c153917f8afe3432603ac03ca9f12
-
SHA512
008b44f171012f1299b473fb281c1d075f50c2b72722bab57db2bd17de8dc3a809e0fd8bbda65af0350b28f77995fd25679865049bd47a1e8a8e9c49bcbd88e5
-
SSDEEP
12288:xju1UXhhcJIxuUb/XANR4KHYl8n0JimybfC0r3buJtZX597j:V5nYguUb/XA4oY2a7ybfCMruJtZXLj
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2316 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2316 AcroRd32.exe 2316 AcroRd32.exe 2316 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\57a684e94d6c944c1b2b9199877f5280N.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2316
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5fa660928f4c17ab3a15ea16c2f9cda05
SHA17a5079946cb67660930d10a41bcbb7e347e06fa1
SHA256db40a8ac7bbe2e9e3789d021ef050b16ab2a6d7fa706eabd95ad6d9247dbe858
SHA5123ab193d0b69d0c8a348d299bfa95642f839f54bc66fcca99f4786436c30aa898c81bd898612c766d3a09e391e99f9b0c738cf5e06c08bd65b2e45d634b508784