Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    90s
  • max time network
    91s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    07/08/2024, 01:35

General

  • Target

    41a899d224b22441bae4bd15d99d5470N.exe

  • Size

    236KB

  • MD5

    41a899d224b22441bae4bd15d99d5470

  • SHA1

    45c755fff492b663a6050b4d926a875088a80bca

  • SHA256

    49ecc41057b6dd9abb1528e487902e36c23f7494d7d7185a6b660fb7fcd7b522

  • SHA512

    0afbf989997b7f1e8f64d06aa518e0b7e2a602414d9148c1013b2c017dafe3affa70fcb7658e095b3727c928a9522c7534390e723fa477b9917e6c0cb89107b4

  • SSDEEP

    3072:PJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/e/FnncroP9:xwDeM7iNEkgiOb31k1ECQJ/F

Score
7/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\41a899d224b22441bae4bd15d99d5470N.exe
    "C:\Users\Admin\AppData\Local\Temp\41a899d224b22441bae4bd15d99d5470N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-D7WWSuk1460gsbbt.exe

    Filesize

    236KB

    MD5

    43fb3d25bfbcfb4332c17ca05e1ab50e

    SHA1

    9f27f11e725ccfe1d71d55b2ce45379ec4797885

    SHA256

    205193558f5191d204af9b03a08ec861f3ffd58809374002d642915d9fa628ba

    SHA512

    f1391ac3ca6d7e6c76a85788956dadd6e8251bf6876f2acd0ac2a2ecdc200e77a2582f237d34cdd73de360dde1f3ab226e811b5f7e2243bfa9b04c20837bd0f9

  • memory/2808-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/2808-1-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB