Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 12:18

General

  • Target

    08e9230a8eaf16cee39b432df07dc080N.exe

  • Size

    236KB

  • MD5

    08e9230a8eaf16cee39b432df07dc080

  • SHA1

    6e48ae5c8e33a8c3f2dd22f6d48c4b7297b11842

  • SHA256

    7a3e838abd6d99b95fcdc55ffd04f1d160d8c32d72bd693c2d8ad50a7c2ef1c0

  • SHA512

    83d72607035157c30989907edbbdf2cca1b196f50b2a775014a083328961e3298b5c8033dbc4283ccdaeed8531f1ce0375f5b93faa9611da56edbbf13993d4a7

  • SSDEEP

    3072:RJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/H/FnncroP9:bwDeM7iNEkgiOb31k1ECXJ/F

Score
7/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\08e9230a8eaf16cee39b432df07dc080N.exe
    "C:\Users\Admin\AppData\Local\Temp\08e9230a8eaf16cee39b432df07dc080N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-m2Y6bTTLNHTzFLxv.exe

    Filesize

    236KB

    MD5

    36d9149654d468489b7d542ea102e3f4

    SHA1

    1171c71d093afb0772a1c0b5e127e3f0195830b5

    SHA256

    69f5165cbb721c84821d17befe3c08c3a5f2c011852374d1080b46ed036cc2b5

    SHA512

    dfb2e8ee2bb820a641bb3ac4d8607a02877a18ac9e3c034639b8eb4bf8ae7cca49703cb110d60c6c2d8b8216e7638e8ed451eeecd6dfe39307a0c81627fbeb62

  • memory/2872-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/2872-1-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB