Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
24/08/2023, 16:37
Static task
static1
Behavioral task
behavioral1
Sample
842d2f82731b89f685eac56663ee98fb_mafia_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
842d2f82731b89f685eac56663ee98fb_mafia_JC.exe
Resource
win10v2004-20230824-en
General
-
Target
842d2f82731b89f685eac56663ee98fb_mafia_JC.exe
-
Size
444KB
-
MD5
842d2f82731b89f685eac56663ee98fb
-
SHA1
7c996f158556cb5f9ab7ec89ab1c653f61a15b08
-
SHA256
b83640dbac31f485cfd150917fff806786dc691aa43cb7270a531a999615e1d6
-
SHA512
d6de6cea7e795d87bed55980e96bdca21dadcf8432241f9580ccacad62a71fecfcaead28dc8f63888c74b133150c7a7826984809a2d7fdd8d8f767d7ad452a59
-
SSDEEP
12288:Nb4bZudi79L1uHpR7GlUK66F/6rNim5A:Nb4bcdkL16G/68+NJ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 840 DD54.tmp -
Executes dropped EXE 1 IoCs
pid Process 840 DD54.tmp -
Loads dropped DLL 1 IoCs
pid Process 2424 842d2f82731b89f685eac56663ee98fb_mafia_JC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2424 wrote to memory of 840 2424 842d2f82731b89f685eac56663ee98fb_mafia_JC.exe 28 PID 2424 wrote to memory of 840 2424 842d2f82731b89f685eac56663ee98fb_mafia_JC.exe 28 PID 2424 wrote to memory of 840 2424 842d2f82731b89f685eac56663ee98fb_mafia_JC.exe 28 PID 2424 wrote to memory of 840 2424 842d2f82731b89f685eac56663ee98fb_mafia_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\842d2f82731b89f685eac56663ee98fb_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\842d2f82731b89f685eac56663ee98fb_mafia_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\DD54.tmp"C:\Users\Admin\AppData\Local\Temp\DD54.tmp" --helpC:\Users\Admin\AppData\Local\Temp\842d2f82731b89f685eac56663ee98fb_mafia_JC.exe D1C04F6AAFE88D630AB56910427EDCCB4AA0C5CDCEF0DDD6CFFD4205D606814B643BFCBBFD9EB0347BF1D34942BB33524DFFCD01B18DC55215316B2BC24ED6A02⤵
- Deletes itself
- Executes dropped EXE
PID:840
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
444KB
MD59d33480e801793ae3f4000cee32c7c6c
SHA1da9556296f0ea6576ee5ae18d96f52523fb2ceeb
SHA2564d2160f0b796111728f725f4888b0874561cc1eb35e794c89840d4887ef5aaee
SHA5122fdb2eb929bb4d333571ca0b4e210ad26f0906a5f37112093e21fe561e1bfcbb747452c688fe58ac1a602293f0370d6479e2eba60474b0b3d6328dc8ab9e08fe
-
Filesize
444KB
MD59d33480e801793ae3f4000cee32c7c6c
SHA1da9556296f0ea6576ee5ae18d96f52523fb2ceeb
SHA2564d2160f0b796111728f725f4888b0874561cc1eb35e794c89840d4887ef5aaee
SHA5122fdb2eb929bb4d333571ca0b4e210ad26f0906a5f37112093e21fe561e1bfcbb747452c688fe58ac1a602293f0370d6479e2eba60474b0b3d6328dc8ab9e08fe