Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    111s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 06:02

General

  • Target

    e638eeca6d1e436c4ed65cda23877de6350e0a53c3a1dc6b25924a253a5ba945N.exe

  • Size

    83KB

  • MD5

    c1ddf332b9ec32783b97e4ff124e7890

  • SHA1

    d1f37351df16a6ad4fbfa5ba30364eee79ffc693

  • SHA256

    e638eeca6d1e436c4ed65cda23877de6350e0a53c3a1dc6b25924a253a5ba945

  • SHA512

    e5ad1dfd73bce6a4f4766337c1d2a07d1a2bd1ee31f807b8897a8be076cc4a7ccfe24acda22631f83936acf1663fe5a213d197c679d1114ab5a03911f801a56e

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+SK:LJ0TAz6Mte4A+aaZx8EnCGVuS

Score
7/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e638eeca6d1e436c4ed65cda23877de6350e0a53c3a1dc6b25924a253a5ba945N.exe
    "C:\Users\Admin\AppData\Local\Temp\e638eeca6d1e436c4ed65cda23877de6350e0a53c3a1dc6b25924a253a5ba945N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3132

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-PkELTa1xyiYNAOVk.exe

    Filesize

    83KB

    MD5

    56f8559108b8a3ba5417e489f2d0e9ef

    SHA1

    3cd9decba58f5d8cb00d8620ef6a7720b423e45c

    SHA256

    62269f45456429732a37e8ac8bd8baa85a5b7dc5a74e6a038b03dafaedb73129

    SHA512

    21835b96419058489481b32bdbb1caec48220df31551a0893979aafeea2a0d3d80f1f2eec49c883bb38fc09e955e4549d4946407deea4b6890113fb22a4ddcd8

  • memory/3132-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3132-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3132-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3132-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3132-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3132-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB