Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Static task
static1
Behavioral task
behavioral1
Sample
30c31f736dab5f1016066aa1a3167571e1e82e8560763c7810d419b84e43ef2b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
30c31f736dab5f1016066aa1a3167571e1e82e8560763c7810d419b84e43ef2b.exe
Resource
win10v2004-20240802-en
General
-
Target
30c31f736dab5f1016066aa1a3167571e1e82e8560763c7810d419b84e43ef2b
-
Size
754KB
-
MD5
152901d4846aa6202bffafbc3c251280
-
SHA1
4434cc04f7e710d8e2f817476ebf4f85d0034d73
-
SHA256
30c31f736dab5f1016066aa1a3167571e1e82e8560763c7810d419b84e43ef2b
-
SHA512
39eba38f88b464da14f4ee964cbdd71382c9cbb04c4686141ef65146afccdb5c57edcb9a34c25b7d2c85c05e9bee14786f9a4ce399eee374a9dfa1d6c91d71c2
-
SSDEEP
12288:+tO6Lm2JmVZnl59E6CpspNxlzCZq3WkYel9S+nTzfX7lVB6qgWIiW+aeO4VtJnQI:iO6LmlVZL9EPm3nCZ8YeArRGh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 30c31f736dab5f1016066aa1a3167571e1e82e8560763c7810d419b84e43ef2b
Files
-
30c31f736dab5f1016066aa1a3167571e1e82e8560763c7810d419b84e43ef2b.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
;@R<wH Size: 261KB - Virtual size: 260KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 363KB - Virtual size: 362KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ