Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    191s
  • max time network
    206s
  • platform
    windows7_x64
  • resource
    win7-20231025-en
  • resource tags

    arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2023, 13:41

General

  • Target

    soldatserver.exe

  • Size

    438KB

  • MD5

    4cc52ec2a4baf5acf90fa9fb83313e54

  • SHA1

    0f27413f9705234b8f20ebb7913a48cba0cfea9a

  • SHA256

    0114b7614eff17ed9347c8c16160ff996189c22fc44009c8f859ece95d65df1d

  • SHA512

    8e785c648a87c6adfbe359dad59a2462b5cab96f2b48c0a89ee426b06e2247eec314157fcba4463c91fd2a692cf78e9fb8ad5e04dec1dcd65061b9836ae648bb

  • SSDEEP

    12288:A77/wWgEtslw4kUydEDloqIntGDA0+6BeULniEo62DPXG:AXYlEtePy1tGDd+6BeUdIP2

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 16 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\soldatserver.exe
    "C:\Users\Admin\AppData\Local\Temp\soldatserver.exe"
    1⤵
      PID:2788

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\logs\ConsoleLog-23-11-07-01.txt

      Filesize

      417B

      MD5

      2f99602db8745dd015929252a8951469

      SHA1

      bd2d3d4ef9999e6cf36a52c6c8d69750ab90136f

      SHA256

      b959554c74e45b66e096136cedff1a2b8cbc87d2106a0f9d2a765222925a53cc

      SHA512

      6d1d26d07e33ba2b6b18829c7e66684f33cf68242d4174c07c3c2ad0ab72acdfcce73fa176946034ad905cf069a279bfe282f16ceae97d8ad5349ac7adf5527c

    • C:\Users\Admin\AppData\Local\Temp\logs\Log-23-11-07-01.txt

      Filesize

      430B

      MD5

      90e9a6e1a271b9c4dbdd281f71e70f69

      SHA1

      eca838298b7c4f3f30665bcc1ae64ad10be9b4fb

      SHA256

      3999ed9895a1b2e7a3bd60ad5b5d791958a1a4494a58ce5020e249c5197d0720

      SHA512

      1732a9ca50e8ef6c9662e2e784eeafee8009f908f22e1ca5f76775969b9d1f12a7b7a584ead220e4147aedc57bea02d2df14bfdd2d0a5e3cc21c25630c965a50

    • C:\Users\Admin\AppData\Local\Temp\logs\kills\KillLog-23-11-07-01.txt

      Filesize

      39B

      MD5

      218f0003f80cc3943b7a7b66f5a1e789

      SHA1

      a4c47624678a0a686942709fe0a78d39f71ead2e

      SHA256

      b6f0ba027b5534a773c51f7ce8f6d9f8487aa336be97529eaf27e2b7f4664f12

      SHA512

      459aa0f52bcd07d1f1205420812c061123de1bcf6b8bbab862eaf6a1713a3f7a2d70a0e7ac69d2fffaf7b3570365b8376d4930a11d03861566ad76608e680ccb

    • memory/2788-39-0x0000000000400000-0x0000000000C0E000-memory.dmp

      Filesize

      8.1MB

    • memory/2788-57-0x0000000000400000-0x0000000000C0E000-memory.dmp

      Filesize

      8.1MB

    • memory/2788-12-0x0000000000400000-0x0000000000C0E000-memory.dmp

      Filesize

      8.1MB

    • memory/2788-11-0x0000000000400000-0x0000000000C0E000-memory.dmp

      Filesize

      8.1MB

    • memory/2788-30-0x0000000000400000-0x0000000000C0E000-memory.dmp

      Filesize

      8.1MB

    • memory/2788-0-0x0000000000400000-0x0000000000C0E000-memory.dmp

      Filesize

      8.1MB

    • memory/2788-48-0x0000000000400000-0x0000000000C0E000-memory.dmp

      Filesize

      8.1MB

    • memory/2788-21-0x0000000000400000-0x0000000000C0E000-memory.dmp

      Filesize

      8.1MB

    • memory/2788-66-0x0000000000400000-0x0000000000C0E000-memory.dmp

      Filesize

      8.1MB

    • memory/2788-75-0x0000000000400000-0x0000000000C0E000-memory.dmp

      Filesize

      8.1MB

    • memory/2788-84-0x0000000000400000-0x0000000000C0E000-memory.dmp

      Filesize

      8.1MB

    • memory/2788-93-0x0000000000400000-0x0000000000C0E000-memory.dmp

      Filesize

      8.1MB

    • memory/2788-102-0x0000000000400000-0x0000000000C0E000-memory.dmp

      Filesize

      8.1MB

    • memory/2788-111-0x0000000000400000-0x0000000000C0E000-memory.dmp

      Filesize

      8.1MB

    • memory/2788-120-0x0000000000400000-0x0000000000C0E000-memory.dmp

      Filesize

      8.1MB

    • memory/2788-129-0x0000000000400000-0x0000000000C0E000-memory.dmp

      Filesize

      8.1MB