Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
23/04/2024, 01:35
Behavioral task
behavioral1
Sample
RV Envo de Factura 406000844.exe
Resource
win7-20240221-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
RV Envo de Factura 406000844.exe
Resource
win10v2004-20240412-en
4 signatures
150 seconds
General
-
Target
RV Envo de Factura 406000844.exe
-
Size
669KB
-
MD5
0ee902b77891a00a701443c7435bb7ff
-
SHA1
8dd9369c138fe01d56588f99ffee600d6f1147bc
-
SHA256
823933e7a978133c5ecfbdf670263ce325b06205405a9989208b23bca6529f2b
-
SHA512
446707d16a9770518eea65f97255379b1113a5938c8d6b130e342129310e7df91808d1273fe47b794eb084e4d61e2745dbbc08c2240a44eb122f30392f20df98
-
SSDEEP
12288:OsHzOUNUSB/o5LsI1uwajJ5yvv1l2nlJ0CCgvtsqkaaLEceMuRGIqTNv:xiUmSB/o5d1ubcvC4us5TUMjrNv
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4720-0-0x0000000000040000-0x00000000001BB000-memory.dmp upx behavioral2/memory/4720-12-0x0000000000040000-0x00000000001BB000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4720-12-0x0000000000040000-0x00000000001BB000-memory.dmp autoit_exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4720 RV Envo de Factura 406000844.exe 4720 RV Envo de Factura 406000844.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4720 RV Envo de Factura 406000844.exe 4720 RV Envo de Factura 406000844.exe