Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/01/2025, 18:47

General

  • Target

    virussign.com_ecc04a1ce003b4a5edb12825179f3a61.exe

  • Size

    83KB

  • MD5

    ecc04a1ce003b4a5edb12825179f3a61

  • SHA1

    23f2a98442ae9052c27df0b15a61c2fd2b02d402

  • SHA256

    32b649b2719a9bef61cfa95b7306ad8a4de55df04bb2100b052e51b6720c867a

  • SHA512

    73bf47d32b61a6b41fbe82a6cbeecece9a65f25fe1b5d9d9bbdee8adc3d9541e7a3587075474f0d7064f48ae63669a62d599f1cd4ab045300d29fd3f1cfe2370

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+0K+:LJ0TAz6Mte4A+aaZx8EnCGVu0n

Score
5/10

Malware Config

Signatures

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\virussign.com_ecc04a1ce003b4a5edb12825179f3a61.exe
    "C:\Users\Admin\AppData\Local\Temp\virussign.com_ecc04a1ce003b4a5edb12825179f3a61.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3384

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rifaien2-lgaDDwCE5jzu5Rxa.exe

    Filesize

    83KB

    MD5

    10f377cff91b5a3d93d5d6a8f76972b1

    SHA1

    eabe37e1c1442c64394df6aef92fc8c16d594dd8

    SHA256

    09aad26e09ffcfcfb03ebba13c788b4d19752e03fdfa3009a5d058f0e017fbad

    SHA512

    093d2cf284451ba3e03098c1ff99f1407920bd3c097a0184671f27138fdf0766ae0414acb6d9b0d60f0f9179df66f958981906cc0c3dbb7be58be9e365a154a2

  • memory/3384-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3384-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3384-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3384-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3384-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3384-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3384-29-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB