Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2024, 17:05 UTC

General

  • Target

    Shipping Documents_Pdf.exe

  • Size

    1.3MB

  • MD5

    dea5082a3541fe4de74d82fa1aa68485

  • SHA1

    af13f6421876b3fcd15bfa579bf2d4f461e315f3

  • SHA256

    9af3fd91cfda8538cecd24a9221ee88cb8fec6f44b5d407703ff913cd1302d1c

  • SHA512

    f962782dccab7f70980f1dd92e02b28d3724054692c0537b5944360be34c1251a99538cdd7461e303920d2c05c8c0eab9b5c9f8b1839686b8815a7f39e462c0c

  • SSDEEP

    24576:uqDEvCTbMWu7rQYlBQcBiT6rprG8aY1VhJG7qWA3K2lQev8KlsM:uTvC/MTQYxsWR7aqVW7qW4lnrl

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Shipping Documents_Pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\Shipping Documents_Pdf.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • System Network Configuration Discovery: Internet Connection Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2628-1-0x0000000000B40000-0x0000000000F40000-memory.dmp

    Filesize

    4.0MB

  • memory/2628-2-0x0000000000B40000-0x0000000000F40000-memory.dmp

    Filesize

    4.0MB

  • memory/2628-3-0x0000000000B40000-0x0000000000F40000-memory.dmp

    Filesize

    4.0MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.