Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    110s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/11/2024, 05:07

General

  • Target

    60510493f9a6a011d5b15e272eecf086e140fe4b28e712415b03220cb1b70452N.exe

  • Size

    83KB

  • MD5

    659b318bef8f8ed011712f847c462cd0

  • SHA1

    6ff90a69cd82f40ae5ab2c835d9a8c6650ce623a

  • SHA256

    60510493f9a6a011d5b15e272eecf086e140fe4b28e712415b03220cb1b70452

  • SHA512

    43193788f9bee611f032c8aab3e58b33b1f18baa4f7eda7db2b976cc6eab13d230e81570c103ac55345ea46b217e971521f07f66809b3f9d6f9bee16d7cb9232

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+5Kp:LJ0TAz6Mte4A+aaZx8EnCGVu56

Score
5/10

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\60510493f9a6a011d5b15e272eecf086e140fe4b28e712415b03220cb1b70452N.exe
    "C:\Users\Admin\AppData\Local\Temp\60510493f9a6a011d5b15e272eecf086e140fe4b28e712415b03220cb1b70452N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-oOSEbh7dsQdJfDDf.exe

    Filesize

    83KB

    MD5

    83dbfaa28c5a3a6f0ead4ec94739f40a

    SHA1

    4a27056374a7734ae92aa75c54a508db9c5069bc

    SHA256

    f8a8a492b7a7ea103b406222bc1e5579d7d43a20b84b50a1b5c4d011f91f74b5

    SHA512

    4bc7a33cf263f899b6df0e5474374c724cf40c364ee6d4ba198564d6b127ca2c1a6ae8d6559af5135fc70c46d00011735ccf49aa541851f44c4acb85f003ebac

  • memory/1676-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1676-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1676-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1676-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1676-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1676-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB