Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    96s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15/09/2024, 08:54

General

  • Target

    7e9f1d0cb782fc43dd120a0f52bb61a0N.exe

  • Size

    83KB

  • MD5

    7e9f1d0cb782fc43dd120a0f52bb61a0

  • SHA1

    2a1d7a87bb026822a02ab79a0292cb41d565dda8

  • SHA256

    8726f323fc53309faef66f2d0245f0c9c1e4eb2e9c0533c16b4961a565c867fe

  • SHA512

    815afa44089ccb53f9d9b11d7e4be00b7abde2c9b5fcb8b635ced35acb0e905ff4eef114505b4a0510b6699d9a11e7772fd68ebe55157e5e2bf89deefe9f8848

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+5K:LJ0TAz6Mte4A+aaZx8EnCGVu5

Score
7/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e9f1d0cb782fc43dd120a0f52bb61a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\7e9f1d0cb782fc43dd120a0f52bb61a0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-UxoIuQU7hIsZZD7h.exe

    Filesize

    83KB

    MD5

    7d25687c68a252c2f7b40842dd962247

    SHA1

    8fb1f7115c6d925f98510b3c91470ba021626eed

    SHA256

    1b38959fe1cb326e5d39031c6807502027d69b7984ec0d1ed3c0126bc91c2a88

    SHA512

    3ae669edcf7d2edb4ed633896665c659e0eadf27ac5d36af255d467d25eed1065d50b45096c27fc6fce7630501908f903c77a82e8410a70a6878f29dd2c04b98

  • memory/2648-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2648-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2648-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2648-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2648-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB