Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/10/2024, 18:28

General

  • Target

    ec1cdb436df007f98a251bf57dfea25ab9fbd644db143368fcdbcd15498044eaN.exe

  • Size

    236KB

  • MD5

    6110bce297155c95dd020418f30c5cc0

  • SHA1

    e50d67e0fd70417db14016f4601783a6275d8dd9

  • SHA256

    ec1cdb436df007f98a251bf57dfea25ab9fbd644db143368fcdbcd15498044ea

  • SHA512

    a0e5d53a197eca67a928c0f465163caf10abb74700c50989bdd223bc33880d0b03416aa578f692b0c663252fef73e135b0ccea56b1c557d4f62e9b8fab6ae3b7

  • SSDEEP

    3072:vJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/9/FnncroP9:RwDeM7iNEkgiOb31k1ECpJ/F

Score
5/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec1cdb436df007f98a251bf57dfea25ab9fbd644db143368fcdbcd15498044eaN.exe
    "C:\Users\Admin\AppData\Local\Temp\ec1cdb436df007f98a251bf57dfea25ab9fbd644db143368fcdbcd15498044eaN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-Nz0raqtB4068xqs6.exe

    Filesize

    236KB

    MD5

    b13e74c26723c869247f5c947d8f056c

    SHA1

    bfc3406742ad8950c6a666283f01b972ba5d2a75

    SHA256

    3bbf1332c1f04a5128df8c3553c7d27bd46dc517985fc6bba3b6b5d3d06c962f

    SHA512

    40f4a0a323f96bc86f5b7b1f412c6971257b12b722b1963f559a4b85620acfaa7219d9ae414913ce9b22d929adf30d0e75495ebad81894c799dadcb100000b63

  • memory/2708-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/2708-1-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB