Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24/11/2024, 06:36
Static task
static1
Behavioral task
behavioral1
Sample
Shipping documents 0000933349450065096000.exe
Resource
win7-20240903-en
General
-
Target
Shipping documents 0000933349450065096000.exe
-
Size
284KB
-
MD5
10cc03882e85151ad4ca3db541f81cf3
-
SHA1
be6b86b006b887fdc5abee6e64a25b5f237445a0
-
SHA256
f2da88c88866585358047c6e08c8fd9c01178c3c8ec61345180d8335c68f3bb7
-
SHA512
6cdce4f6a27b565d938adfeb59dbc8e9e3e2ed02d86281f62ce7de82febe71c45520bf13ce1834c9662fbf13880ff714227635399c6dce1bc43048852b2abc18
-
SSDEEP
6144:UYRl7vMcPxo+C0Kl9D7k0UjHCHjQ9mHHa1gNC33FLkvKoNGJxmEa2QUkeS/op+:T4cY1DRUeHjomHHGgN7vKopwQReS/v
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Shipping documents 0000933349450065096000.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2212 Shipping documents 0000933349450065096000.exe 2784 Shipping documents 0000933349450065096000.exe 2800 Shipping documents 0000933349450065096000.exe 2816 Shipping documents 0000933349450065096000.exe 2812 Shipping documents 0000933349450065096000.exe 2804 Shipping documents 0000933349450065096000.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2212 Shipping documents 0000933349450065096000.exe 2212 Shipping documents 0000933349450065096000.exe 2212 Shipping documents 0000933349450065096000.exe 2212 Shipping documents 0000933349450065096000.exe 2212 Shipping documents 0000933349450065096000.exe 2212 Shipping documents 0000933349450065096000.exe 2212 Shipping documents 0000933349450065096000.exe 2212 Shipping documents 0000933349450065096000.exe 2212 Shipping documents 0000933349450065096000.exe 2212 Shipping documents 0000933349450065096000.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2212 Shipping documents 0000933349450065096000.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2784 2212 Shipping documents 0000933349450065096000.exe 30 PID 2212 wrote to memory of 2784 2212 Shipping documents 0000933349450065096000.exe 30 PID 2212 wrote to memory of 2784 2212 Shipping documents 0000933349450065096000.exe 30 PID 2212 wrote to memory of 2784 2212 Shipping documents 0000933349450065096000.exe 30 PID 2212 wrote to memory of 2800 2212 Shipping documents 0000933349450065096000.exe 31 PID 2212 wrote to memory of 2800 2212 Shipping documents 0000933349450065096000.exe 31 PID 2212 wrote to memory of 2800 2212 Shipping documents 0000933349450065096000.exe 31 PID 2212 wrote to memory of 2800 2212 Shipping documents 0000933349450065096000.exe 31 PID 2212 wrote to memory of 2804 2212 Shipping documents 0000933349450065096000.exe 32 PID 2212 wrote to memory of 2804 2212 Shipping documents 0000933349450065096000.exe 32 PID 2212 wrote to memory of 2804 2212 Shipping documents 0000933349450065096000.exe 32 PID 2212 wrote to memory of 2804 2212 Shipping documents 0000933349450065096000.exe 32 PID 2212 wrote to memory of 2812 2212 Shipping documents 0000933349450065096000.exe 33 PID 2212 wrote to memory of 2812 2212 Shipping documents 0000933349450065096000.exe 33 PID 2212 wrote to memory of 2812 2212 Shipping documents 0000933349450065096000.exe 33 PID 2212 wrote to memory of 2812 2212 Shipping documents 0000933349450065096000.exe 33 PID 2212 wrote to memory of 2816 2212 Shipping documents 0000933349450065096000.exe 34 PID 2212 wrote to memory of 2816 2212 Shipping documents 0000933349450065096000.exe 34 PID 2212 wrote to memory of 2816 2212 Shipping documents 0000933349450065096000.exe 34 PID 2212 wrote to memory of 2816 2212 Shipping documents 0000933349450065096000.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\Shipping documents 0000933349450065096000.exe"C:\Users\Admin\AppData\Local\Temp\Shipping documents 0000933349450065096000.exe"1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\Shipping documents 0000933349450065096000.exe"C:\Users\Admin\AppData\Local\Temp\Shipping documents 0000933349450065096000.exe"2⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2784
-
-
C:\Users\Admin\AppData\Local\Temp\Shipping documents 0000933349450065096000.exe"C:\Users\Admin\AppData\Local\Temp\Shipping documents 0000933349450065096000.exe"2⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2800
-
-
C:\Users\Admin\AppData\Local\Temp\Shipping documents 0000933349450065096000.exe"C:\Users\Admin\AppData\Local\Temp\Shipping documents 0000933349450065096000.exe"2⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2804
-
-
C:\Users\Admin\AppData\Local\Temp\Shipping documents 0000933349450065096000.exe"C:\Users\Admin\AppData\Local\Temp\Shipping documents 0000933349450065096000.exe"2⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2812
-
-
C:\Users\Admin\AppData\Local\Temp\Shipping documents 0000933349450065096000.exe"C:\Users\Admin\AppData\Local\Temp\Shipping documents 0000933349450065096000.exe"2⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2816
-