Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    110s
  • max time network
    95s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30/09/2024, 21:38

General

  • Target

    f4e192741abca231804f1a0a15794871ab081ef394a2d0e0ee9186709438f735N.exe

  • Size

    83KB

  • MD5

    e54fa6271b070999a3438877a6187320

  • SHA1

    93183b3c6d3faed02070f807929cc9e78183d19a

  • SHA256

    f4e192741abca231804f1a0a15794871ab081ef394a2d0e0ee9186709438f735

  • SHA512

    8b7a006ac931c823169786c45d8a18da3f6f385cd01b357f02dddf16bc56bb13ec6c1d0800e3ccb6aafde0c85bbe71fcda012f1943c08b9a6e1ad4176bdfcbb8

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+7K:LJ0TAz6Mte4A+aaZx8EnCGVu7

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f4e192741abca231804f1a0a15794871ab081ef394a2d0e0ee9186709438f735N.exe
    "C:\Users\Admin\AppData\Local\Temp\f4e192741abca231804f1a0a15794871ab081ef394a2d0e0ee9186709438f735N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2084

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-NHNC3ybJVajzdWhN.exe

    Filesize

    83KB

    MD5

    8b31d40775b9f84c3c2b208c37048e35

    SHA1

    ffff023c997656b667b0aad188ae648d27384a0e

    SHA256

    d3673eacb0fda56f80cd4d1cf0a7d2cf169a36ef0ef2616e456fb0caf8532695

    SHA512

    02da4cd84b6c472d120a6442207043878043dfae2eb830eaa06a90a374ea62683cb938e3a81f103b5ab356efce338401fc3946c3e36a66e1dc728922ca6e732a

  • memory/2084-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2084-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2084-6-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2084-13-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2084-23-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB