Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/07/2024, 15:06

General

  • Target

    22afa4b6d9eb6b052babea1242fd3420N.exe

  • Size

    83KB

  • MD5

    22afa4b6d9eb6b052babea1242fd3420

  • SHA1

    f636a3075db4fa75ce5e185bfe00fd34552a8eba

  • SHA256

    000d9f1e3e6f13f1a7ef2397b44ba24a8d0bd6543b5d7f9ce846f837006e6d57

  • SHA512

    efa3b0c2639b8615a9a1aa69f444c4a9c83a2244cab59e5b4d1198f2b4e8d1b79cb780288ba0cd157ce055ba53977914541166b93e48b68c767cfa2df55202fe

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+iK:LJ0TAz6Mte4A+aaZx8EnCGVui

Score
7/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\22afa4b6d9eb6b052babea1242fd3420N.exe
    "C:\Users\Admin\AppData\Local\Temp\22afa4b6d9eb6b052babea1242fd3420N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1292

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-jkg3DPZ8u20yyoAS.exe

    Filesize

    83KB

    MD5

    b0649063623859813d8d06bbf1d92f1b

    SHA1

    92a0cdecf59d2d8e878d426dc72a46ed3bfeee65

    SHA256

    01ab8c23d483145b4369a75d60591fa37a853e3def80e0d066bc0cee0403e509

    SHA512

    db8031bbf8ca7bcefdcd263a66c64f560e091d2a26f42679201e1801d94e8fa4d8ec79a9406c408c0d225c4badd2db714afb64caf5550adde44235f2ea2acc6f

  • memory/1292-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1292-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1292-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1292-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1292-21-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB