Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    03/08/2023, 15:08

General

  • Target

    47f42eed77718e0ae46afb5b057be1a5_mafia_JC.exe

  • Size

    428KB

  • MD5

    47f42eed77718e0ae46afb5b057be1a5

  • SHA1

    fbe282b133bc21310a090e5ca82c64770f6497f9

  • SHA256

    2f67fdafc50b939f3bde12489b3ce5d73c83b663507195c5b04cb11406d7af0f

  • SHA512

    91cc030745247e997f2d01a5b0cef3212b956c94cdd81bf9e8072a014bb1562635fdf4e11ae005e3cadc0ae671a924c0a5f39513ab108b3d2a95ddabc44f180e

  • SSDEEP

    12288:Z594+AcL4tBekiuKzErbxi/UKVXYizgWq8/jl:BL4tBekiuVrbgRV3D

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\47f42eed77718e0ae46afb5b057be1a5_mafia_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\47f42eed77718e0ae46afb5b057be1a5_mafia_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2488
    • C:\Users\Admin\AppData\Local\Temp\8585.tmp
      "C:\Users\Admin\AppData\Local\Temp\8585.tmp" --helpC:\Users\Admin\AppData\Local\Temp\47f42eed77718e0ae46afb5b057be1a5_mafia_JC.exe E9B01FE60F515F1D1F208191A8875C45B533913FEB7B4249F8CA3D586A52A1EA39B9FC026BE9202552555B3D1321B5C9C6DCB17E846026A92D62D06365D4365F
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1400

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\8585.tmp

    Filesize

    428KB

    MD5

    2a67dd79bcf766b6ee671fb8a2e8360e

    SHA1

    9ab6d5984e744f7e1a78c2a46133f5c4a73ed6f6

    SHA256

    fc9f57e443fc0bd23289aa157d1ef7621deba9992f6e4c651269123853fcb453

    SHA512

    e624bc214f1a8aa574e7d44fa359fd5f069dd1cb1a28001f3e981434c7a0e864905235f0e7ae6955a2fb47be55a3e10ab1d9b21444dd7308191788b39b9d482e

  • \Users\Admin\AppData\Local\Temp\8585.tmp

    Filesize

    428KB

    MD5

    2a67dd79bcf766b6ee671fb8a2e8360e

    SHA1

    9ab6d5984e744f7e1a78c2a46133f5c4a73ed6f6

    SHA256

    fc9f57e443fc0bd23289aa157d1ef7621deba9992f6e4c651269123853fcb453

    SHA512

    e624bc214f1a8aa574e7d44fa359fd5f069dd1cb1a28001f3e981434c7a0e864905235f0e7ae6955a2fb47be55a3e10ab1d9b21444dd7308191788b39b9d482e