Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
96s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 11:38
Behavioral task
behavioral1
Sample
901a4ff28264cc1eb652a4ab497eac98e24242bec67a85b41975d456dcc6595f.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
901a4ff28264cc1eb652a4ab497eac98e24242bec67a85b41975d456dcc6595f.pdf
Resource
win10v2004-20240802-en
General
-
Target
901a4ff28264cc1eb652a4ab497eac98e24242bec67a85b41975d456dcc6595f.pdf
-
Size
230KB
-
MD5
a17ccb338f19f48fb23808c2f4e55705
-
SHA1
cb7d17ffb758655ae9fcfa9554656a3f824140a9
-
SHA256
901a4ff28264cc1eb652a4ab497eac98e24242bec67a85b41975d456dcc6595f
-
SHA512
f85e3dca9c227e60e0ad119f9cd3f97b7d647b01fd2e79c6fb68acb6e969e7ecbb78b17fdf1ab4945395bda840d0029dfe1e1c8cbdc878c3937611c3dc933c9d
-
SSDEEP
6144:T216T4FdB75Dbor/7mZz/tijJJ83luQSwhT8ZX+oSfZsieidc:yeER2/obtkJJaYQZhT8ZXrCZs/idc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1140 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1140 AcroRd32.exe 1140 AcroRd32.exe 1140 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\901a4ff28264cc1eb652a4ab497eac98e24242bec67a85b41975d456dcc6595f.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1140
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5c8d4ec31626a248db02b3406bcb113ea
SHA107bacb4ac94f05919b18c1fe371c8ca52ba7b161
SHA2563a99fed4d7a0e4680854a67d7b4e5f221e12f9fac66d6aeca8d4faa2668fba73
SHA5120c9da0c7e79fb452d342d83cd977adbf46ca1c2dfcb016d8419aee3ba14839aefc7457c169faf849ccd6797e56c2fd5e9a32d7f99cdd067d3cd1efcb6ce232e2