Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    110s
  • max time network
    91s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    13/09/2024, 08:49

General

  • Target

    211dc390b2dc195681ade4a2a0bfb590N.exe

  • Size

    83KB

  • MD5

    211dc390b2dc195681ade4a2a0bfb590

  • SHA1

    fc42760ee100acdee67b4acf5a2c5005476cfc45

  • SHA256

    dec382ec3ac38af8e81f4f6b903c5c6b69ef6e5f189db987a5746343be141265

  • SHA512

    07ab6a67172062f7b2335414dc7504703103496137b8c8c32bf7601e8e6b75d72a891cf71f746cf0ae91e88eb247a578ab8288d900db845da6c1ff81b9c9a899

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+TK:LJ0TAz6Mte4A+aaZx8EnCGVuT

Score
7/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\211dc390b2dc195681ade4a2a0bfb590N.exe
    "C:\Users\Admin\AppData\Local\Temp\211dc390b2dc195681ade4a2a0bfb590N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-AUpnJ4FyrxSShuPn.exe

    Filesize

    83KB

    MD5

    2fd416ee2e27791488a3fffa9ed27c16

    SHA1

    92e7965c59dbfaf6c36d10da622b0a3fb3b42255

    SHA256

    b7c0f245ac263076873fca1f212c8dca002e1605342038889bccd1976c6efd13

    SHA512

    27714e55458e10c099c7261da6c8e5dd80b24ef7c0fbbd26e800b9e48010d29f21f83ccbb06e94b703b7904fa7e7fd5ec7fc6ac970bd3175c9b6bbd6fdbae872

  • memory/2684-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2684-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2684-7-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2684-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2684-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB