Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    111s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2024, 05:27

General

  • Target

    27b996b32a667665e01ca060ab2140a65c511457b16ec483a0208ee8ed835b9fN.exe

  • Size

    83KB

  • MD5

    d06c0ae71c0b5f04857544b8fb2bc9e0

  • SHA1

    ff175fea1fd364f9063275ff773c2da20ea16728

  • SHA256

    27b996b32a667665e01ca060ab2140a65c511457b16ec483a0208ee8ed835b9f

  • SHA512

    2eda6a05254c5d7be4d1db053d1f385a1779030498d0241c2904535a8cc23dfa37d9553ab0a67a5710306dd96157c1f7fec308337011b9ca824fe41efd4da123

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+mK:LJ0TAz6Mte4A+aaZx8EnCGVum

Score
5/10

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\27b996b32a667665e01ca060ab2140a65c511457b16ec483a0208ee8ed835b9fN.exe
    "C:\Users\Admin\AppData\Local\Temp\27b996b32a667665e01ca060ab2140a65c511457b16ec483a0208ee8ed835b9fN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2252

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-sL9TqdrRrC99aULB.exe

    Filesize

    83KB

    MD5

    63b93cdd5b2cc8e4fbb13537ed7e4887

    SHA1

    e3f91eea2b467533483156ed5bf4cf6be9e5958c

    SHA256

    a89e85e1d19d5a944e84651f5afd95137bc34c4ed758d752803752307a9f17b4

    SHA512

    0b2a4beaeee459eca9ac47dac39727e2950f97b37d27cccb51f959ed5912d3d547727412d18d7ae3fcf85f6a173aa6163ccc2bebabe8cc11a7ed85457eacbdd5

  • memory/2252-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2252-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2252-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2252-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2252-21-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB