Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Static task
static1
Behavioral task
behavioral1
Sample
d1de8eab99525598f7b13a25a23198027558cad2e5a2e41136b21eec6bdca3b0.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d1de8eab99525598f7b13a25a23198027558cad2e5a2e41136b21eec6bdca3b0.exe
Resource
win10v2004-20241007-en
General
-
Target
d1de8eab99525598f7b13a25a23198027558cad2e5a2e41136b21eec6bdca3b0
-
Size
3.1MB
-
MD5
948a713ab2d70948c17e8ef766ffe5c4
-
SHA1
b4798d5d7338cc6bb815d086f59a6bcc25dbe528
-
SHA256
d1de8eab99525598f7b13a25a23198027558cad2e5a2e41136b21eec6bdca3b0
-
SHA512
431ff44c9bda2a31f7cb1ef85184d0c04d1d0cdb60d2da2f2fd0a0af3825dfbe52cb7518f2873397b27bd87651d2c6a898762c475c592fc09f4b937ae9fdbdd8
-
SSDEEP
49152:xf+pqgZ94Vxfd95je39JOHd23S4v3eoaAJg84E5:xKqgZ94VVn5Ky92i4v3eLEF5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d1de8eab99525598f7b13a25a23198027558cad2e5a2e41136b21eec6bdca3b0
Files
-
d1de8eab99525598f7b13a25a23198027558cad2e5a2e41136b21eec6bdca3b0.exe windows:6 windows x86 arch:x86
2eabe9054cad5152567f0699947a2c5b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpy
Sections
Size: 416KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
jfnkylyg Size: 2.7MB - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
npgdbzun Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE