Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

15/07/2024, 17:03

240715-vk1kfa1ajl 4

15/07/2024, 17:03

240715-vkpg6szhrk 3

15/07/2024, 17:00

240715-vh1sestamf 5

15/07/2024, 16:56

240715-vfnebashpg 3

15/07/2024, 16:52

240715-vdqfwszfqj 3

15/07/2024, 16:51

240715-vcsvmazfmm 4

15/07/2024, 16:50

240715-vcbw4ssgqb 3

01/07/2024, 15:46

240701-s7pekssapm 3

01/07/2024, 15:43

240701-s5y61axhpa 4

01/07/2024, 15:41

240701-s4sylasamj 3

Analysis

  • max time network
    6s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    15/07/2024, 16:50

Errors

Reason
Payload did not run: unable to install sample: Exception occurred while executing 'install': java.lang.IllegalArgumentException: Error: Failed to parse APK file: NXOV4.2.dll: Failed to parse NXOV4.2.dll at com.android.server.pm.PackageManagerShellCommand.setParamsSize(PackageManagerShellCommand.java:528) at com.android.server.pm.PackageManagerShellCommand.doRunInstall(PackageManagerShellCommand.java:1282) at com.android.server.pm.PackageManagerShellCommand.runInstall(PackageManagerShellCommand.java:1248) at com.android.server.pm.PackageManagerShellCommand.onCommand(PackageManagerShellCommand.java:184) at android.os.BasicShellCommandHandler.exec(BasicShellCommandHandler.java:98) at android.os.ShellCommand.exec(ShellCommand.java:44) at com.android.server.pm.PackageManagerService.onShellCommand(PackageManagerService.java:21646) at android.os.Binder.shellCommand(Binder.java:929) at android.os.Binder.onTransact(Binder.java:813) at android.content.pm.IPackageManager$Stub.onTransact(IPackageManager.java:4603) at com.android.server.pm.PackageManagerService.onTransact(PackageManagerService.java:4305) at android.os.Binder.execTransactInternal(Binder.java:1159) at android.os.Binder.execTransact(Binder.java:1123) Caused by: java.io.IOException: Failed to load asset path NXOV4.2.dll from fd 301 at android.content.res.ApkAssets.nativeLoadFd(Native Method) at android.content.res.ApkAssets.<init>(ApkAssets.java:302) at android.content.res.ApkAssets.loadFromFd(ApkAssets.java:173) at android.content.pm.parsing.ApkLiteParseUtils.parseApkLiteInner(ApkLiteParseUtils.java:238) at android.content.pm.parsing.ApkLiteParseUtils.parseApkLite(ApkLiteParseUtils.java:226) at com.android.server.pm.PackageManagerShellCommand.setParamsSize(PackageManagerShellCommand.java:522) ... 12 more

General

  • Target

    NXOV4.2.dll

  • Size

    1.5MB

  • MD5

    2fd3f4348ffc36ed2edb18c1c204bd3e

  • SHA1

    1295a7987084a4c31a561518b4ea936ba05701eb

  • SHA256

    e7c86a734df3942463079883b96930f223b3cd40b501d32c3d143687d546d444

  • SHA512

    97fc477cd153ad811ceadc60443af544137fd5197c7ba99f6dc05e19aff3d8d364ab41efdeb87b067327d2f4b331173efe1daed3804d8594bf62e046f5399d73

  • SSDEEP

    12288:jWcvWYVU2jcnUh2+gkE+sPIdAfBXjvtQ2U1YMGI:yzUh2+gT+fMfQgI

Score
1/10

Malware Config

Signatures

Processes

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads