Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Static task
static1
Behavioral task
behavioral1
Sample
00d109a581d9757f77f149aa0766398946a4a4c82dfe7fb85435c784faa93a3b.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
00d109a581d9757f77f149aa0766398946a4a4c82dfe7fb85435c784faa93a3b.exe
Resource
win10v2004-20220414-en
General
-
Target
00d109a581d9757f77f149aa0766398946a4a4c82dfe7fb85435c784faa93a3b
-
Size
150KB
-
MD5
dcabfb6eb919767fa14b71f2bfdcbe00
-
SHA1
c598d24b226f8188924f6e34f1aa86e890c64229
-
SHA256
00d109a581d9757f77f149aa0766398946a4a4c82dfe7fb85435c784faa93a3b
-
SHA512
d06fa847be6f4f48413200d0a1d21f271cff464e975b8687308cda9bf4a2bcd522f3b9c511465f6cd24f37a05bc322545504b138437f673307dda4c6dcb9f871
-
SSDEEP
3072:p9dUEfLpw3gCjYbUIazrdwheg+NrXJmT69Pz5YHrN+FD3O:p9d/w3gaYbUDzrA0dmT6ps2S
Malware Config
Signatures
Files
-
00d109a581d9757f77f149aa0766398946a4a4c82dfe7fb85435c784faa93a3b.exe windows x86
df9a6f4e3a81f50ca4dd77c47ad68cf4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
netapi32
NetApiBufferFree
NetServerEnum
ws2_32
WSAStartup
gethostname
inet_ntoa
gethostbyname
mpr
WNetAddConnection2A
WNetCancelConnection2A
kernel32
CreateFileA
FreeLibrary
WriteFile
GetStdHandle
FormatMessageA
LoadLibraryExA
GetConsoleScreenBufferInfo
LockResource
SizeofResource
LoadResource
FindResourceA
DeleteFileA
GetSystemDirectoryA
GetComputerNameA
GetCurrentProcess
WideCharToMultiByte
GetTickCount
WaitForSingleObject
SetEvent
ConnectNamedPipe
ReadFile
GetFullPathNameA
GetCommandLineA
GetLocaleInfoA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
GetStringTypeW
GetStringTypeA
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
Sleep
SetLastError
GetCommandLineW
LocalAlloc
LoadLibraryA
OpenProcess
LocalFree
GetVersion
GetLastError
TerminateProcess
CloseHandle
GetModuleHandleA
GetProcAddress
EnumSystemLocalesA
IsValidLocale
SetFilePointer
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
HeapSize
GetLocaleInfoW
GetTimeZoneInformation
SetEndOfFile
GetProcessHeap
CompareStringA
CompareStringW
GetModuleFileNameA
HeapFree
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
ExitThread
GetCurrentThreadId
CreateThread
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
PeekConsoleInputA
GetNumberOfConsoleInputEvents
GetModuleHandleW
ExitProcess
HeapCreate
HeapDestroy
VirtualFree
DeleteCriticalSection
FatalAppExitA
VirtualAlloc
HeapReAlloc
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThread
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
LCMapStringA
MultiByteToWideChar
LCMapStringW
SetHandleCount
GetFileType
GetStartupInfoA
GetConsoleCP
RtlUnwind
FlushFileBuffers
SetConsoleCtrlHandler
InterlockedExchange
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
user32
LoadCursorA
SetCursor
SetWindowTextA
SendMessageA
EndDialog
GetSysColorBrush
GetDlgItem
DialogBoxIndirectParamA
InflateRect
gdi32
SetMapMode
StartDocA
StartPage
EndPage
EndDoc
GetDeviceCaps
comdlg32
PrintDlgA
advapi32
DeleteService
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
LogonUserA
ImpersonateLoggedOnUser
RegConnectRegistryA
RevertToSelf
ControlService
OpenSCManagerA
OpenServiceA
StartServiceA
QueryServiceStatus
CreateServiceA
CloseServiceHandle
RegCreateKeyA
RegQueryValueExA
RegSetValueExA
RegCloseKey
Sections
.text Size: 114KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ