Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/01/2024, 18:41

General

  • Target

    753aa809e9840a85d8cb724df65dd257.exe

  • Size

    6KB

  • MD5

    753aa809e9840a85d8cb724df65dd257

  • SHA1

    2258d63d00ab55a124da4e476e9571f29ba1bb27

  • SHA256

    75e4875d6a22a1991f4ba86c4f4fd3a9f509f182b11a3ba5a81d614683f1f1d9

  • SHA512

    808a570ab5e11028110b4a621c1841aede87c81536550781942cf2c6f41af700b2d13c7232687ba756e8d2affab8083d4877bc039be417fbd3fce4d851d9f886

  • SSDEEP

    96:kdJwLyfEQ9TwDd1m6iRa95C9IKYNOXqWjTLQ/RNVzYiiAJO5QRK35m:KffncbuaW9IKYEaWj41zYKJ1g5m

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\753aa809e9840a85d8cb724df65dd257.exe
    "C:\Users\Admin\AppData\Local\Temp\753aa809e9840a85d8cb724df65dd257.exe"
    1⤵
      PID:2460

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2460-0-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2460-1-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2460-2-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2460-3-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2460-4-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2460-9-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2460-10-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2460-11-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB