Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Static task
static1
Behavioral task
behavioral1
Sample
25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe
Resource
win10v2004-20230915-en
General
-
Target
25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.zip
-
Size
140KB
-
MD5
c5ada7c215261b7333b58d24b657e990
-
SHA1
dcfe6fe33714418f65ba1a68eca7f71cac7a3070
-
SHA256
22457bbeee5f0c20c4272b72c1d0d34991753d6d84802ba56cdd9d11155d043d
-
SHA512
e53eb0e1410d187218b740cd17acf6a387245bc7ed38269103b1ca2cc33b652303d98676abb27992e2ab7c5f91186c1adcb303c8a5f27634fb4acca324a4729e
-
SSDEEP
3072:4E38zhWRoHgn8Qk+YWJMeMOg5bn8LR3NVmdntGz4bWhwmre:4ELRoHgn85+XLMhbn893fmjMrw+e
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708
Files
-
25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.zip.zip
Password: infected
-
25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe windows x86
e8fe6c58a0a1d7d1162ad35656f7aaec
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
StrCpyW
StrCmpIW
StrCmpNIW
PathQuoteSpacesW
StrStrIW
StrDupW
PathFindFileNameW
PathFindExtensionW
StrCpyNW
wvnsprintfA
ole32
CoInitializeEx
CoUninitialize
psapi
GetModuleFileNameExW
mpr
WNetEnumResourceW
WNetOpenEnumW
WNetCloseEnum
ntdll
_chkstk
memset
NtQueryVirtualMemory
_allshr
ZwQueryInformationProcess
memcpy
_allshl
RtlUnwind
RtlUpcaseUnicodeChar
wcsstr
_stricmp
_aullshr
_allmul
_alldiv
_vsnprintf
_wcslwr
strstr
_aulldiv
shell32
ShellExecuteExA
CommandLineToArgvW
kernel32
GetModuleFileNameW
GetLogicalDriveStringsW
CreateProcessW
GetCommandLineW
GetDriveTypeW
Wow64DisableWow64FsRedirection
AllocConsole
WaitForSingleObject
SetErrorMode
ExitProcess
MoveFileW
GetFileAttributesW
SetFileAttributesW
AttachConsole
GetLocalTime
ExpandEnvironmentStringsW
CreateFileW
QueryPerformanceFrequency
HeapFree
HeapAlloc
GetCommandLineA
WaitForMultipleObjects
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
TerminateProcess
CreateFileMappingW
CreateFileMappingA
TlsSetValue
GetProcAddress
GlobalMemoryStatus
LocalAlloc
GetProcessHeap
GetProcessTimes
GetProcessWorkingSetSize
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetThreadTimes
GetLastError
SetLastError
InitializeCriticalSection
GetTickCount
LoadLibraryA
GetStartupInfoW
QueryPerformanceCounter
LocalFree
GetStdHandle
WriteFile
FlushFileBuffers
lstrlenA
OutputDebugStringA
CreateThread
ExitThread
TerminateThread
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
Sleep
FindClose
CloseHandle
FileTimeToSystemTime
lstrcpyW
lstrcatW
TlsAlloc
TlsGetValue
FindFirstFileW
FindNextFileW
SetConsoleTitleA
GetFileSize
GetFileSizeEx
ReadFile
SetEndOfFile
SetFilePointer
SetFilePointerEx
GetFileTime
SetFileTime
MapViewOfFile
UnmapViewOfFile
OpenProcess
user32
wsprintfA
GetDesktopWindow
GetCaretPos
GetCursorPos
GetCapture
GetInputState
GetFocus
GetActiveWindow
GetOpenClipboardWindow
GetProcessWindowStation
GetMessagePos
GetMessageTime
GetClipboardOwner
GetClipboardViewer
GetQueueStatus
advapi32
CryptReleaseContext
CryptGenRandom
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
CryptAcquireContextW
Sections
.text Size: 234KB - Virtual size: 234KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ