Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

05/02/2025, 07:15

250205-h3bb2swkgw 10

01/10/2022, 23:38

221001-3m1bfsddfr 10

Analysis

  • max time network
    6s
  • platform
    android_x64
  • resource
    android-33-x64-arm64-20240624-en
  • resource tags

    androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system
  • submitted
    05/02/2025, 07:15

Errors

Reason
Payload did not run: unable to install sample: Exception occurred while executing 'install': java.lang.IllegalArgumentException: Error: Failed to parse APK file: b5d124db5d66a5d485386c072e17817af44a82353735eb5bb51f6d3890fbf734.exe: Failed to parse b5d124db5d66a5d485386c072e17817af44a82353735eb5bb51f6d3890fbf734.exe at com.android.server.pm.PackageManagerShellCommand.setParamsSize(PackageManagerShellCommand.java:617) at com.android.server.pm.PackageManagerShellCommand.doRunInstall(PackageManagerShellCommand.java:1442) at com.android.server.pm.PackageManagerShellCommand.runInstall(PackageManagerShellCommand.java:1408) at com.android.server.pm.PackageManagerShellCommand.onCommand(PackageManagerShellCommand.java:221) at com.android.modules.utils.BasicShellCommandHandler.exec(BasicShellCommandHandler.java:97) at android.os.ShellCommand.exec(ShellCommand.java:38) at com.android.server.pm.PackageManagerService$IPackageManagerImpl.onShellCommand(PackageManagerService.java:5964) at android.os.Binder.shellCommand(Binder.java:1049) at android.os.Binder.onTransact(Binder.java:877) at android.content.pm.IPackageManager$Stub.onTransact(IPackageManager.java:4313) at com.android.server.pm.PackageManagerService$IPackageManagerImpl.onTransact(PackageManagerService.java:5948) at android.os.Binder.execTransactInternal(Binder.java:1285) at android.os.Binder.execTransact(Binder.java:1244) Caused by: java.io.IOException: Failed to load asset path b5d124db5d66a5d485386c072e17817af44a82353735eb5bb51f6d3890fbf734.exe from fd 537 at android.content.res.ApkAssets.nativeLoadFd(Native Method) at android.content.res.ApkAssets.<init>(ApkAssets.java:307) at android.content.res.ApkAssets.loadFromFd(ApkAssets.java:178) at android.content.pm.parsing.ApkLiteParseUtils.parseApkLiteInner(ApkLiteParseUtils.java:355) at android.content.pm.parsing.ApkLiteParseUtils.parseApkLite(ApkLiteParseUtils.java:343) at com.android.server.pm.PackageManagerShellCommand.setParamsSize(PackageManagerShellCommand.java:611) ... 12 more

General

  • Target

    b5d124db5d66a5d485386c072e17817af44a82353735eb5bb51f6d3890fbf734.exe

  • Size

    650KB

  • MD5

    6f182568b036db62c171ff3bfe774ea0

  • SHA1

    28755d5099480a9cb6150a1647e0e2cb304b2183

  • SHA256

    b5d124db5d66a5d485386c072e17817af44a82353735eb5bb51f6d3890fbf734

  • SHA512

    2f31f0bf2778d1a362bc93cb9045a43951d4c81aa589c19c839d3a40a4ccb0f89266c17357fee158b07d020f58eb6343c2a8bbdbdeb3597205cc6f73f4091911

  • SSDEEP

    12288:Y8UaT9XY2siA0bMG09xD7I3Gg8ecgVvfBoCDBOQQYbVXpuy1f/gORixK:xUKoN0bUxgGa/pfBHDb+y1HgZA

Score
1/10

Malware Config

Signatures

Processes

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads