Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    20/05/2024, 21:03

General

  • Target

    36444cbd268cc3a039053f7abdb3c8d10bea2b2e196b79dbcadf15597acf6375.exe

  • Size

    83KB

  • MD5

    cfe07645b49968b21a53f8f0fdc4604a

  • SHA1

    bfc245495c2554de76df183060ee0e4ec39caeca

  • SHA256

    36444cbd268cc3a039053f7abdb3c8d10bea2b2e196b79dbcadf15597acf6375

  • SHA512

    f9532bcafa3b8f0af11f30c038d16bcc2ce495e4e14c4b6bec0bb2e3c36059c641e7310ad8f5b1570dceb3d6c1f4630abdbc550110b97db07440b2656bb478d8

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+jK:LJ0TAz6Mte4A+aaZx8EnCGVuj

Score
9/10
upx

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 7 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\36444cbd268cc3a039053f7abdb3c8d10bea2b2e196b79dbcadf15597acf6375.exe
    "C:\Users\Admin\AppData\Local\Temp\36444cbd268cc3a039053f7abdb3c8d10bea2b2e196b79dbcadf15597acf6375.exe"
    1⤵
      PID:2972

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-0mi99bK6GmyZzONq.exe

      Filesize

      83KB

      MD5

      513470609cff696508248e31230738db

      SHA1

      99cc9543b9f8e76f83d7c5df6a90ce04c498ce5e

      SHA256

      d512904a9ac67f29795581a10a7f4845105b6795ae253cea2f5d79198e4eea63

      SHA512

      35ee6759fc467717884f19a0d5e7c3a2bd8c6be7ba707046149f911fbf252334cf76d684df26b4fca9b7146e33999aafd052146c4590eb6bb53f44eaee73658e

    • memory/2972-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2972-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2972-7-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2972-14-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2972-21-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2972-28-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB