Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/01/2024, 08:13
Behavioral task
behavioral1
Sample
7c9b97ee8ce6b2a666321eda144158a1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7c9b97ee8ce6b2a666321eda144158a1.exe
Resource
win10v2004-20231215-en
General
-
Target
7c9b97ee8ce6b2a666321eda144158a1.exe
-
Size
2.1MB
-
MD5
7c9b97ee8ce6b2a666321eda144158a1
-
SHA1
9fd14f408d7fc569b39e134405f62f9a7b5aff98
-
SHA256
c24021a2e14046b8b56c606a20d515279c3bd7a1221b5304f6bc48253cb752b6
-
SHA512
cb54cfcb876e27f63ff9e73dbdf631b4bb156dae242db50f8c3669b220c8b1057ba9bf41a150492587f6bfd7880761687be0685aa2db2d13e3aac8fe015bdf8c
-
SSDEEP
49152:1fwZFKbHWLybWGD40HsRSNqnhZh+zXzIlU/2TaFBoV:1fw/KNWGDeRScnzh+32Ko
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
resource yara_rule behavioral2/memory/4552-0-0x0000000000400000-0x0000000000652000-memory.dmp upx behavioral2/memory/4552-1-0x0000000000400000-0x0000000000652000-memory.dmp upx