Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 19:39

General

  • Target

    42af73b2777a7e61bdb77a1cb79cff60N.exe

  • Size

    236KB

  • MD5

    42af73b2777a7e61bdb77a1cb79cff60

  • SHA1

    a30bb2898a0488b78f17569b52777a63c63431f8

  • SHA256

    68606b0f231f40e11abd3530edf166702e5b2b6180abd04f6a07994de7d2a8a9

  • SHA512

    69779519c11b3aceffe925e5d7d2af9a9ee2209a64a8cc9e60a8da6c84143d738e3f6603addfaed67527e3c5d852b56e2606db1f4ddb4c3cd811567e23de5fb0

  • SSDEEP

    3072:DJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/N/FnncroP9:FwDeM7iNEkgiOb31k1ECJJ/F

Score
7/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\42af73b2777a7e61bdb77a1cb79cff60N.exe
    "C:\Users\Admin\AppData\Local\Temp\42af73b2777a7e61bdb77a1cb79cff60N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-vId3puZxbbsg603P.exe

    Filesize

    236KB

    MD5

    608e57100203fc6cf9674a5a68dd5816

    SHA1

    058dc043b008f241cb0d4e1d37fb7eccd47ca31c

    SHA256

    60fdd367764a6afcf93ff10da8dd966c38085006e9cd0101e1a97b273d6a5ead

    SHA512

    c81ce764d90e08454fb55b7ca135c55c00f72dd0f2de53ae36a99150e7e8affcc134ff514408547aaaa8f9949906b196ed94ffd2a7bebca05a1b7d504dca6178

  • memory/1928-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/1928-1-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB