Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    112s
  • max time network
    92s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    23/07/2024, 04:09

General

  • Target

    62081176cfed33aef451df4ee7ede170N.exe

  • Size

    83KB

  • MD5

    62081176cfed33aef451df4ee7ede170

  • SHA1

    44f1ad01ea98e6e2f59c299f5bccae4f52814420

  • SHA256

    09848990f883e2fa34437263c5b456b420379814a1751ea55de82ca44e652b56

  • SHA512

    e1359bd1486840d803a8ab0fb25a344fb0506021418ae0e0f0d9d003f4cc22a2771b48316922e9e7729ddf9d86801be0b6294dc5ef98f2c1a0e7c68d68c1a4e7

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+EK:LJ0TAz6Mte4A+aaZx8EnCGVuE

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\62081176cfed33aef451df4ee7ede170N.exe
    "C:\Users\Admin\AppData\Local\Temp\62081176cfed33aef451df4ee7ede170N.exe"
    1⤵
      PID:2368

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-qi1bLPyCkcGmDx4y.exe

      Filesize

      83KB

      MD5

      ea09f6ef47cceb78eb941e8357f48107

      SHA1

      ac5eb38e123d39917127b90764d5453458c0294a

      SHA256

      9a7930bc00981b70f13785a587e09685ee413e2069c1ae4c8ab54b75acd4cb31

      SHA512

      5c7c3c02f269220bcf4e27457d7d96990c80a0633706bad7602a131e6f5f2f2da72b16144bc4a2bec3f160a9728590ec9d2cd7cac69314d2dd2667075298e928

    • memory/2368-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2368-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2368-4-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2368-8-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2368-14-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2368-21-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB