Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

26/02/2025, 07:01

250226-htjbasxjv8 10

25/02/2025, 04:05

250225-enxd7atjy7 3

25/02/2025, 04:00

250225-ekttwssqy6 10

25/02/2025, 03:40

250225-d79cessjs5 10

25/02/2025, 03:10

250225-dpfmdszpw9 10

25/02/2025, 02:49

250225-dazrqaym19 10

25/02/2025, 02:42

250225-c61hfsyj15 10

Analysis

  • max time network
    6s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    25/02/2025, 04:05

Errors

Reason
Payload did not run: unable to install sample: Exception occurred while executing 'install': java.lang.IllegalArgumentException: Error: Failed to parse APK file: 80f45f70d66652a814a2784f3e3da3d304a2e3466bda889791a5de0117862593.exe: Failed to parse 80f45f70d66652a814a2784f3e3da3d304a2e3466bda889791a5de0117862593.exe at com.android.server.pm.PackageManagerShellCommand.setParamsSize(PackageManagerShellCommand.java:528) at com.android.server.pm.PackageManagerShellCommand.doRunInstall(PackageManagerShellCommand.java:1282) at com.android.server.pm.PackageManagerShellCommand.runInstall(PackageManagerShellCommand.java:1248) at com.android.server.pm.PackageManagerShellCommand.onCommand(PackageManagerShellCommand.java:184) at android.os.BasicShellCommandHandler.exec(BasicShellCommandHandler.java:98) at android.os.ShellCommand.exec(ShellCommand.java:44) at com.android.server.pm.PackageManagerService.onShellCommand(PackageManagerService.java:21646) at android.os.Binder.shellCommand(Binder.java:929) at android.os.Binder.onTransact(Binder.java:813) at android.content.pm.IPackageManager$Stub.onTransact(IPackageManager.java:4603) at com.android.server.pm.PackageManagerService.onTransact(PackageManagerService.java:4305) at android.os.Binder.execTransactInternal(Binder.java:1159) at android.os.Binder.execTransact(Binder.java:1123) Caused by: java.io.IOException: Failed to load asset path 80f45f70d66652a814a2784f3e3da3d304a2e3466bda889791a5de0117862593.exe from fd 311 at android.content.res.ApkAssets.nativeLoadFd(Native Method) at android.content.res.ApkAssets.<init>(ApkAssets.java:302) at android.content.res.ApkAssets.loadFromFd(ApkAssets.java:173) at android.content.pm.parsing.ApkLiteParseUtils.parseApkLiteInner(ApkLiteParseUtils.java:238) at android.content.pm.parsing.ApkLiteParseUtils.parseApkLite(ApkLiteParseUtils.java:226) at com.android.server.pm.PackageManagerShellCommand.setParamsSize(PackageManagerShellCommand.java:522) ... 12 more

General

  • Target

    80f45f70d66652a814a2784f3e3da3d304a2e3466bda889791a5de0117862593.exe

  • Size

    767KB

  • MD5

    d7b952b18e2fba388e8ae076488af9e2

  • SHA1

    20a1a5c98e93b87d58d8c6ddbe2450f657e59113

  • SHA256

    80f45f70d66652a814a2784f3e3da3d304a2e3466bda889791a5de0117862593

  • SHA512

    5777c6ff439a89d1571b3104b3fc9b43e5392cecdcd2c8100019582bfb383328648ef86735dbda8e15270f0853bff3ea9864f26a7f9c40d016269e417aa2f04f

  • SSDEEP

    12288:7GqN/XdctpVtkMtsyDqBQ0tA3nyF0Fh0zJmViYV5yvQX05oWI:lNcBtkUqBQ0tknx5yIXgoWI

Score
1/10

Malware Config

Signatures

Processes

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads