Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    110s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2024, 14:24

General

  • Target

    96909ecd95a61c710fc67b0866e64ae8505e6f0e9798910bf8d98e1d3d277d8dN.exe

  • Size

    83KB

  • MD5

    113e290af47f9c676ab8971ac614db70

  • SHA1

    3c2caffdd3cb92a65bd44c1ee210d68addd1fd03

  • SHA256

    96909ecd95a61c710fc67b0866e64ae8505e6f0e9798910bf8d98e1d3d277d8d

  • SHA512

    401a87d27cdd2f25be89d322fcc2586fb5b78f1d67c02c2cf3ee8d5d1f3877b062e70fbcbd077f816415d28f9f740f0448f197db114f83c90076ab7510e84280

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+tK:LJ0TAz6Mte4A+aaZx8EnCGVut

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\96909ecd95a61c710fc67b0866e64ae8505e6f0e9798910bf8d98e1d3d277d8dN.exe
    "C:\Users\Admin\AppData\Local\Temp\96909ecd95a61c710fc67b0866e64ae8505e6f0e9798910bf8d98e1d3d277d8dN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-ajOHPoE6dDQvdZNj.exe

    Filesize

    83KB

    MD5

    35dde2290906460568577d78da21066a

    SHA1

    888eb03e5504ed99c7cc7c26c1e6895183b45081

    SHA256

    e99d4697621630f816d801b562ca24a4b22600d532f33cc4e46106ecabf2f680

    SHA512

    ea1393b49cdf16e90768ff9d2074e274991b384d7b13d340b24b626ad82d398c9ac516ccf5e6934d90608db86e07cbb8d80c1b4dd95eac600902577f4fedd5bc

  • memory/3572-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3572-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3572-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3572-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3572-19-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB