Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

25/03/2025, 13:19

250325-qkkrrszps5 10

05/02/2025, 11:22

250205-ngk71strbx 10

25/06/2024, 15:43

240625-s6cz6a1gnj 10

25/06/2024, 15:17

240625-sn4p6axdma 10

Analysis

  • max time network
    6s
  • platform
    android_x64
  • resource
    android-33-x64-arm64-20240624-en
  • resource tags

    androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system
  • submitted
    05/02/2025, 11:22

Errors

Reason
Payload did not run: unable to install sample: Exception occurred while executing 'install': java.lang.IllegalArgumentException: Error: Failed to parse APK file: 706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.7z: Failed to parse 706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.7z at com.android.server.pm.PackageManagerShellCommand.setParamsSize(PackageManagerShellCommand.java:617) at com.android.server.pm.PackageManagerShellCommand.doRunInstall(PackageManagerShellCommand.java:1442) at com.android.server.pm.PackageManagerShellCommand.runInstall(PackageManagerShellCommand.java:1408) at com.android.server.pm.PackageManagerShellCommand.onCommand(PackageManagerShellCommand.java:221) at com.android.modules.utils.BasicShellCommandHandler.exec(BasicShellCommandHandler.java:97) at android.os.ShellCommand.exec(ShellCommand.java:38) at com.android.server.pm.PackageManagerService$IPackageManagerImpl.onShellCommand(PackageManagerService.java:5964) at android.os.Binder.shellCommand(Binder.java:1049) at android.os.Binder.onTransact(Binder.java:877) at android.content.pm.IPackageManager$Stub.onTransact(IPackageManager.java:4313) at com.android.server.pm.PackageManagerService$IPackageManagerImpl.onTransact(PackageManagerService.java:5948) at android.os.Binder.execTransactInternal(Binder.java:1285) at android.os.Binder.execTransact(Binder.java:1244) Caused by: java.io.IOException: Failed to load asset path 706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.7z from fd 483 at android.content.res.ApkAssets.nativeLoadFd(Native Method) at android.content.res.ApkAssets.<init>(ApkAssets.java:307) at android.content.res.ApkAssets.loadFromFd(ApkAssets.java:178) at android.content.pm.parsing.ApkLiteParseUtils.parseApkLiteInner(ApkLiteParseUtils.java:355) at android.content.pm.parsing.ApkLiteParseUtils.parseApkLite(ApkLiteParseUtils.java:343) at com.android.server.pm.PackageManagerShellCommand.setParamsSize(PackageManagerShellCommand.java:611) ... 12 more

General

  • Target

    706F3EEC328E91FF7F66C8F0A2FB9B556325C153A329A2062DC85879C540839D.7z

  • Size

    33KB

  • MD5

    6611740b5be8acf02c30c78a0feec0a3

  • SHA1

    458d4fbd8452785c729a1e41cdf434c40afcc86b

  • SHA256

    c644cbce9a802252e9021e43959a90015538f3e8e40cbe87a518b9458389c4a8

  • SHA512

    299f9aa4cc44b8fd541a3479edea9b809ecbe29b2d4402cb602791461976ab0fa2d1c40a715e2e124d07a930ce775747ae287ca8c29a3b01e7345a48548f01be

  • SSDEEP

    768:hH1DRycS4DIPj45eT5vDwu7FH9AdnwIn86p11xw8oPGh60F36Im:DRF7DIPMavnRH9AFwI511x+yKIm

Score
1/10

Malware Config

Signatures

Processes

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads