Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    110s
  • max time network
    97s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/09/2024, 20:42

General

  • Target

    222fa6241b66247a0c9fb0037f7d73f0N.exe

  • Size

    83KB

  • MD5

    222fa6241b66247a0c9fb0037f7d73f0

  • SHA1

    be1f5a1181546fa0a04ad40752797d8e9eded93c

  • SHA256

    da9bb0e363c224cce3e26bc5f27789bb24b09018724dd57acb0e6fbb405ed83d

  • SHA512

    2e88c360be4edf8842a75a8b9ae79653fbfe875f625cbdff4387a66cea92a03998b6a80d58821da002f1887cf6c417b5815e2a34365ca3070f8648a467b2e099

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+yK:LJ0TAz6Mte4A+aaZx8EnCGVuy

Score
7/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\222fa6241b66247a0c9fb0037f7d73f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\222fa6241b66247a0c9fb0037f7d73f0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-Mc4FZFC8Ywdvzf7n.exe

    Filesize

    83KB

    MD5

    1fa41c95685e876a61c8f4b9fbf1eb5b

    SHA1

    4c8720af6bd1a03e9905729da96f58e938122e66

    SHA256

    bcbe825bbadd8977d7c7e294618226ee19edd6b3c01f0a6533021a42d4132843

    SHA512

    ada9c006e3310e1692d8f2c7eceec8796776bf1ce7f2c7c0d0408f99d3a78d31de62fd23b0b61c7592d44475f24d54a2f7ee71793e4b5994b42fca9c4184939f

  • memory/1764-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1764-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1764-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1764-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1764-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1764-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB