Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    30/08/2023, 16:30

General

  • Target

    e26d9bca80b06c92fa2b859ffa8ecd13_mafia_JC.exe

  • Size

    414KB

  • MD5

    e26d9bca80b06c92fa2b859ffa8ecd13

  • SHA1

    ca234bfb303eb56766ac17f41b9fa9d6a3b8b7ec

  • SHA256

    b9b02ee1a72f0345b9b4ae4d02c5ca2d8df3ba62b5920db9c388ef724db39e21

  • SHA512

    326ed5c18b6d391074a760f48ab6a7d1467884d7fb8b41b4b71da6d7f1d9fc5bd8d0c1d1a28f4f7f47a35a5dda934f355fb41c19c33ffd16f664b21872cecbb1

  • SSDEEP

    12288:Wq4w/ekieZgU6qCNDDnQt4no43+dviQQlx:Wq4w/ekieH6qcDK4no0+gr

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e26d9bca80b06c92fa2b859ffa8ecd13_mafia_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\e26d9bca80b06c92fa2b859ffa8ecd13_mafia_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2616
    • C:\Users\Admin\AppData\Local\Temp\785B.tmp
      "C:\Users\Admin\AppData\Local\Temp\785B.tmp" --helpC:\Users\Admin\AppData\Local\Temp\e26d9bca80b06c92fa2b859ffa8ecd13_mafia_JC.exe 6E58940657889B0AB064AADB9C486E60DBAB2137502ECB94E206C96B62B159C3C5FF6CDC6F8A44EC859C4DF894F1EE024EDC0C5E2D07ABA3492AAF956F09172E
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:3028

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\785B.tmp

    Filesize

    414KB

    MD5

    177fda76cc0344c74f0425d4760c1aab

    SHA1

    78ea5e7f850ef021909c196d2d9cf2861155c7f9

    SHA256

    087606532d1edcee28773294c492099f8af5c032b8a787358ceafe911418074c

    SHA512

    b74a8a1df1d6cd9cb2b97da99d6649423d311fcb85c7a3668f18afbe29bf0414382c6e5a04f3c43aafba1e8810e24249312f345f47d607bdb753f5800bd1f076

  • \Users\Admin\AppData\Local\Temp\785B.tmp

    Filesize

    414KB

    MD5

    177fda76cc0344c74f0425d4760c1aab

    SHA1

    78ea5e7f850ef021909c196d2d9cf2861155c7f9

    SHA256

    087606532d1edcee28773294c492099f8af5c032b8a787358ceafe911418074c

    SHA512

    b74a8a1df1d6cd9cb2b97da99d6649423d311fcb85c7a3668f18afbe29bf0414382c6e5a04f3c43aafba1e8810e24249312f345f47d607bdb753f5800bd1f076