Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/09/2024, 19:32

General

  • Target

    8aa0fa30a148c454f211992028f60e31d4100aba0e673acd0b3635504c3e0a3eN.exe

  • Size

    83KB

  • MD5

    c4c94f85ac80e693a42a253443b05410

  • SHA1

    17e0065c478b1e4e67371af7d7df574d871c24f9

  • SHA256

    8aa0fa30a148c454f211992028f60e31d4100aba0e673acd0b3635504c3e0a3e

  • SHA512

    17b476c355c470c49a35701251c4c1cc4e04b68370f459af7cdd5aee5c85f03153e45beb9387b87b94efe5171a115c63e3e5e07fe00b5b2855687e898fda4d90

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+lK:LJ0TAz6Mte4A+aaZx8EnCGVul

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8aa0fa30a148c454f211992028f60e31d4100aba0e673acd0b3635504c3e0a3eN.exe
    "C:\Users\Admin\AppData\Local\Temp\8aa0fa30a148c454f211992028f60e31d4100aba0e673acd0b3635504c3e0a3eN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2300

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-jpzFsQ0RD7vMK93L.exe

    Filesize

    83KB

    MD5

    609b8bdd04dd9f4445c31adef0db076e

    SHA1

    581956936ebea7ef6a4a40e6998e6ef9f2de323b

    SHA256

    239b8968b635dd5a0b2f91626bf644c3b8fb2d177523b1d19e59e3c3574fd681

    SHA512

    41baacc884ed588fa70c312230f652f7db019083e7d1eaf491e1a679ba32ec90871b6ac5b7c192a20ac1e10d5fae916cce8cb3bd927d3fa5acfb55f39d21d762

  • memory/2300-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2300-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2300-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2300-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2300-19-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB