Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    111s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2024, 11:23

General

  • Target

    d0b6ffc9b7c6d51696d36d21731516243112f3e6972e9d5222342936fc1f4358N.exe

  • Size

    83KB

  • MD5

    e764bd1f2ca307872b54467a0ac34320

  • SHA1

    e06678e26a4a6da1a501a55d0f91f25f6da321fc

  • SHA256

    d0b6ffc9b7c6d51696d36d21731516243112f3e6972e9d5222342936fc1f4358

  • SHA512

    2cb5c1a056185e369c04968e03282127ca454d4b766251f8987d7b6b985f44551459a681bd04a573b9877a5ed6b69ea1c7f9f137cc75f11c8933b6d5300d5bde

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+TK:LJ0TAz6Mte4A+aaZx8EnCGVuT

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d0b6ffc9b7c6d51696d36d21731516243112f3e6972e9d5222342936fc1f4358N.exe
    "C:\Users\Admin\AppData\Local\Temp\d0b6ffc9b7c6d51696d36d21731516243112f3e6972e9d5222342936fc1f4358N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-m3S85FbUBndaedwL.exe

    Filesize

    83KB

    MD5

    bd97e132835b9ede4aaced0a144dbff7

    SHA1

    b6c377c97230537fc88c5ddb40804ebc245f5f0e

    SHA256

    3af774243ebd6068bd3e731c4922ecffc09f5579c9f9347c6399d4e385d59535

    SHA512

    98da7aeeda6242a5ccec8dd4e661f254d19be0d35e4dceab336cf6991d1075197cfd38774f19afff5911fed624768cec3f0b7607f443b98dd054932ecb24678c

  • memory/1636-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1636-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1636-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1636-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1636-13-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1636-21-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB