Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

05/02/2025, 07:19

250205-h5lwkaxndj 10

07/10/2022, 19:32

221007-x8zddsdeap 10

01/10/2022, 23:37

221001-3mgjcadden 10

Analysis

  • max time network
    6s
  • platform
    android_x64
  • resource
    android-33-x64-arm64-20240624-en
  • resource tags

    androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system
  • submitted
    05/02/2025, 07:19

Errors

Reason
Payload did not run: unable to install sample: Exception occurred while executing 'install': java.lang.IllegalArgumentException: Error: Failed to parse APK file: c879c4891a1eba5c4f3a1bf38e3ed8d530ce67721cab3b26547ff50190b55ede.exe: Failed to parse c879c4891a1eba5c4f3a1bf38e3ed8d530ce67721cab3b26547ff50190b55ede.exe at com.android.server.pm.PackageManagerShellCommand.setParamsSize(PackageManagerShellCommand.java:617) at com.android.server.pm.PackageManagerShellCommand.doRunInstall(PackageManagerShellCommand.java:1442) at com.android.server.pm.PackageManagerShellCommand.runInstall(PackageManagerShellCommand.java:1408) at com.android.server.pm.PackageManagerShellCommand.onCommand(PackageManagerShellCommand.java:221) at com.android.modules.utils.BasicShellCommandHandler.exec(BasicShellCommandHandler.java:97) at android.os.ShellCommand.exec(ShellCommand.java:38) at com.android.server.pm.PackageManagerService$IPackageManagerImpl.onShellCommand(PackageManagerService.java:5964) at android.os.Binder.shellCommand(Binder.java:1049) at android.os.Binder.onTransact(Binder.java:877) at android.content.pm.IPackageManager$Stub.onTransact(IPackageManager.java:4313) at com.android.server.pm.PackageManagerService$IPackageManagerImpl.onTransact(PackageManagerService.java:5948) at android.os.Binder.execTransactInternal(Binder.java:1285) at android.os.Binder.execTransact(Binder.java:1244) Caused by: java.io.IOException: Failed to load asset path c879c4891a1eba5c4f3a1bf38e3ed8d530ce67721cab3b26547ff50190b55ede.exe from fd 536 at android.content.res.ApkAssets.nativeLoadFd(Native Method) at android.content.res.ApkAssets.<init>(ApkAssets.java:307) at android.content.res.ApkAssets.loadFromFd(ApkAssets.java:178) at android.content.pm.parsing.ApkLiteParseUtils.parseApkLiteInner(ApkLiteParseUtils.java:355) at android.content.pm.parsing.ApkLiteParseUtils.parseApkLite(ApkLiteParseUtils.java:343) at com.android.server.pm.PackageManagerShellCommand.setParamsSize(PackageManagerShellCommand.java:611) ... 12 more

General

  • Target

    c879c4891a1eba5c4f3a1bf38e3ed8d530ce67721cab3b26547ff50190b55ede.exe

  • Size

    658KB

  • MD5

    01f80684f9ebae1fc31a67e9fc6b4eb8

  • SHA1

    cd0a5f3d1b66fe80c07a99815c9fb15605c8198c

  • SHA256

    c879c4891a1eba5c4f3a1bf38e3ed8d530ce67721cab3b26547ff50190b55ede

  • SHA512

    c68b087676e11e210aceaabbefa18122d109b3c383ee25a635a327c6d477a9d73637ab49093a02b1756d65291a105601130196f8dbec832940cf0103bb28a721

  • SSDEEP

    12288:+9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hS:KZ1xuVVjfFoynPaVBUR8f+kN10EB8

Score
1/10

Malware Config

Signatures

Processes

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads