Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Static task
static1
Behavioral task
behavioral1
Sample
cf33803ead9f221274a5ef6bfd8121dce055921bbf7b8053624f22277fb00f90.exe
Resource
win7-20241010-en
General
-
Target
0a42cbe3d32c42cfccf044a27e02b7ff.bin
-
Size
234KB
-
MD5
2954a3b01b5c51a6a6bdb6235534b732
-
SHA1
9393a2703af0d2db16f83074dc32fcb85b48d651
-
SHA256
7499cca94b51f38f936474c5c11638b8e95c308ece6d4ddfeab18d02f2e84467
-
SHA512
322571fc6ee276d399e5e52a0ea126ffacfdc255bf20d18d827b50b1ae9906b99e3ffeacb1f8929cf57ee8e7649fea5f1144d69fbb3e451556cadc387eae2775
-
SSDEEP
6144:Ce7eF22sK3S4nxWtcae3EwxgHW+hPF1rNGPjGtiV:NSkWS4nwtcae3EwxO/PNCGgV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/cf33803ead9f221274a5ef6bfd8121dce055921bbf7b8053624f22277fb00f90.exe
Files
-
0a42cbe3d32c42cfccf044a27e02b7ff.bin.zip
Password: infected
-
cf33803ead9f221274a5ef6bfd8121dce055921bbf7b8053624f22277fb00f90.exe.exe windows:5 windows x86 arch:x86
Password: infected
3978bc23ce46139d07304b225b33a7c7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLocaleInfoA
DeleteVolumeMountPointA
InterlockedIncrement
GetConsoleAliasA
SetDefaultCommConfigW
GetComputerNameW
GetProcessPriorityBoost
GetModuleHandleW
GetDateFormatA
GetEnvironmentStrings
LoadLibraryW
ReadProcessMemory
GetTimeFormatW
CreateProcessA
GetAtomNameW
GetStartupInfoW
GetShortPathNameA
SetLastError
PulseEvent
SearchPathA
SetFileAttributesA
BuildCommDCBW
GetNumaHighestNodeNumber
LoadLibraryA
UnhandledExceptionFilter
InterlockedExchangeAdd
LocalAlloc
AddAtomA
FoldStringW
OpenFileMappingW
WriteConsoleOutputAttribute
FindFirstVolumeA
FindAtomW
UnregisterWaitEx
CreateFileA
WriteConsoleW
GetProcAddress
GetCommandLineW
MultiByteToWideChar
GetCommandLineA
GetStartupInfoA
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
GetLastError
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
LeaveCriticalSection
EnterCriticalSection
GetLocaleInfoA
InitializeCriticalSectionAndSpinCount
HeapAlloc
VirtualAlloc
HeapReAlloc
RtlUnwind
HeapSize
ReadFile
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
SetStdHandle
CloseHandle
WriteConsoleA
GetConsoleOutputCP
GetModuleHandleA
user32
GetClassLongW
gdi32
GetBitmapBits
Sections
.text Size: 253KB - Virtual size: 252KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 46KB - Virtual size: 3.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ