Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2024, 01:32
Static task
static1
Behavioral task
behavioral1
Sample
Arrival Notice.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Arrival Notice.exe
Resource
win10v2004-20240802-en
General
-
Target
Arrival Notice.exe
-
Size
1.3MB
-
MD5
d0795c21655e695487f9010d0ee96b61
-
SHA1
fcedd916a4239b77ef2abf94a1c1ebcd43be8ee4
-
SHA256
c50835a7b48e2529da9800dc09085031199a43eee88ad3ffaee4b46a40ebc152
-
SHA512
182c1093812169cbe11d98c4283a73ccb7b83a99c2fd9ac8a7d750d3a02a1751b3ad96ad762300e8cf4047b64630a0990f8e7474bb9ac12ea60c72fc492e523a
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaCglxgmRSRhIh6nt5kJCjChBG4Q+:7JZoQrbTFZY1iaCgl+mRw7kJCjiGs
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1204 set thread context of 3176 1204 Arrival Notice.exe 82 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Arrival Notice.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3176 svchost.exe 3176 svchost.exe 3176 svchost.exe 3176 svchost.exe 3176 svchost.exe 3176 svchost.exe 3176 svchost.exe 3176 svchost.exe 3176 svchost.exe 3176 svchost.exe 3176 svchost.exe 3176 svchost.exe 3176 svchost.exe 3176 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1204 Arrival Notice.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1204 Arrival Notice.exe 1204 Arrival Notice.exe 1204 Arrival Notice.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1204 Arrival Notice.exe 1204 Arrival Notice.exe 1204 Arrival Notice.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1204 wrote to memory of 3176 1204 Arrival Notice.exe 82 PID 1204 wrote to memory of 3176 1204 Arrival Notice.exe 82 PID 1204 wrote to memory of 3176 1204 Arrival Notice.exe 82 PID 1204 wrote to memory of 3176 1204 Arrival Notice.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\Arrival Notice.exe"C:\Users\Admin\AppData\Local\Temp\Arrival Notice.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Arrival Notice.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3176
-