Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Static task
static1
Behavioral task
behavioral1
Sample
f1107d0bce75510a76fc68a917c48afc205459471e22a95dbbd0e52dbd445075.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f1107d0bce75510a76fc68a917c48afc205459471e22a95dbbd0e52dbd445075.exe
Resource
win10v2004-20220812-en
General
-
Target
f1107d0bce75510a76fc68a917c48afc205459471e22a95dbbd0e52dbd445075.zip
-
Size
255KB
-
MD5
907c1317ed5315dae0ca1ca27ca6dd29
-
SHA1
9c38ca0489b2812850c2c0811ed7bae5cd9bf93d
-
SHA256
923f0004d98184c745251b3adc3210d6ece6a22a9d463670a86de0285e3b561d
-
SHA512
9c64d04d543cace702502e8b30fd892f788a275d38f2901ffb5588fa9d1f385271b6336f761aeb1bba8a66504fb882e70bc3dcd93362121363db651e37069a1d
-
SSDEEP
6144:vMYeMFoMcwiJ5a2SU3fkPgyBLa4Omyb4YPds3oFbsi9V5:v7eMFo5SGf8gyBmmybVTb5
Malware Config
Signatures
Files
-
f1107d0bce75510a76fc68a917c48afc205459471e22a95dbbd0e52dbd445075.zip.zip
Password: infected
-
f1107d0bce75510a76fc68a917c48afc205459471e22a95dbbd0e52dbd445075.exe.exe windows x86
Password: infected
35df0081a66dd5736a634c136f4b9626
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateTimerQueue
lstrlenA
GetConsoleAliasesLengthW
GetDefaultCommConfigW
HeapAlloc
_lwrite
InterlockedDecrement
GetSystemWindowsDirectoryW
SetEnvironmentVariableW
GetUserDefaultLCID
SetConsoleScreenBufferSize
SetVolumeMountPointW
GetConsoleAliasesLengthA
GetCommandLineA
GetEnvironmentStrings
GetConsoleCP
ReadConsoleInputA
WriteConsoleOutputA
GetComputerNameExA
lstrcpynW
GetFileAttributesW
LocalReAlloc
WriteConsoleW
HeapQueryInformation
GetMailslotInfo
ReadFile
GetModuleFileNameW
GetVolumeNameForVolumeMountPointA
GetConsoleOutputCP
InterlockedExchange
ChangeTimerQueueTimer
SetLastError
GetProcAddress
PeekConsoleInputW
BeginUpdateResourceW
EnumDateFormatsExA
RemoveDirectoryA
EnterCriticalSection
ResetEvent
GetLocalTime
LoadLibraryA
OpenMutexA
IsWow64Process
GlobalGetAtomNameW
GetCurrentConsoleFont
GetOEMCP
GetModuleHandleA
GetConsoleTitleW
BuildCommDCBA
VirtualProtect
GetFileAttributesExW
SetCalendarInfoA
FindFirstVolumeA
ReleaseMutex
GetCurrentProcessId
GetConsoleProcessList
EnumCalendarInfoExA
GetTimeZoneInformation
GetSystemDefaultLangID
CreateFileA
SetStdHandle
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleW
Sleep
ExitProcess
GetStartupInfoA
RaiseException
RtlUnwind
GetLastError
WriteFile
GetStdHandle
GetModuleFileNameA
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapFree
LeaveCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
IsValidCodePage
HeapSize
GetLocaleInfoA
GetConsoleMode
FlushFileBuffers
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
SetFilePointer
CloseHandle
WriteConsoleA
user32
RealGetWindowClassA
Sections
.text Size: 194KB - Virtual size: 194KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 40.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ