Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    111s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/10/2024, 01:31

General

  • Target

    485fbad960493cd61ff6231763eb80f5c627a74878c6b7df757c6fb1f3c56f9dN.exe

  • Size

    83KB

  • MD5

    d55a612ea78e5fba9b0900d3500fddf0

  • SHA1

    d572ba2b6bbd0268153a04dbe9dde3dc96238ebc

  • SHA256

    485fbad960493cd61ff6231763eb80f5c627a74878c6b7df757c6fb1f3c56f9d

  • SHA512

    34080480df7e2fb870bc4c7e890179ce657467e720361a5b68d958354545eb005295be0ab3a17ae85778d9f95fbf1307cf9c54c063d70c8c82418db923bb19fe

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+UK:LJ0TAz6Mte4A+aaZx8EnCGVuU

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\485fbad960493cd61ff6231763eb80f5c627a74878c6b7df757c6fb1f3c56f9dN.exe
    "C:\Users\Admin\AppData\Local\Temp\485fbad960493cd61ff6231763eb80f5c627a74878c6b7df757c6fb1f3c56f9dN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3144

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-qE0e4hpg2RaHNUCH.exe

    Filesize

    83KB

    MD5

    46e3614f60ac1a3181a5d461b43cf7f7

    SHA1

    046e873887f35da0206d30e6ea92aaec649f15a0

    SHA256

    f35dc8e710defe27e0ac7937e68ea3d26c3e0cce3a5fdce7af749c48e925c32d

    SHA512

    974a562ca8c82ccc89af74cd0f56d215bbd9ab0613a5b62fc53d40abc5df12c777eaea9d1e9932e419b8b284e5a4d9ccf2fa0410a777073a6fd4b18384a21608

  • memory/3144-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3144-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3144-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3144-9-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3144-16-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3144-23-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB