Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/10/2023, 19:07

General

  • Target

    NEAS.2023-09-07_a0efb75c0e4cb83cb96b91adac8877a3_mafia_JC.exe

  • Size

    222KB

  • MD5

    a0efb75c0e4cb83cb96b91adac8877a3

  • SHA1

    a78681b149a6a31fbd9f03c3d413b29ed27daecd

  • SHA256

    a349d3cf02075b7d65429cb41612f6d870e94d55208ecfde31b291e867f199dc

  • SHA512

    9681ceed8fc875a528e3b31f6e0231696b8e3dc624f220e7c9dbb687e1dc13ea33a2f6ea352d5f7ba287100da06ed85b62dd5d5ac47e6d3893c5af857b6ae799

  • SSDEEP

    3072:GBbWxYKFDnqvffIj0nStxBN3cwqvcQr3YTfVEPnYbl3/YrDAEioKhAv/:GBkYKZSYYnS1xecmoT2nYbdEKs/

Malware Config

Signatures

  • GandCrab payload 2 IoCs
  • Gandcrab

    Gandcrab is a Trojan horse that encrypts files on a computer.

  • Program crash 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-07_a0efb75c0e4cb83cb96b91adac8877a3_mafia_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-07_a0efb75c0e4cb83cb96b91adac8877a3_mafia_JC.exe"
    1⤵
      PID:4888
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 468
        2⤵
        • Program crash
        PID:5024
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4888 -ip 4888
      1⤵
        PID:3752

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/4888-0-0x0000000002180000-0x000000000219B000-memory.dmp

        Filesize

        108KB

      • memory/4888-1-0x0000000002180000-0x000000000219B000-memory.dmp

        Filesize

        108KB

      • memory/4888-2-0x0000000000400000-0x000000000043D000-memory.dmp

        Filesize

        244KB

      • memory/4888-3-0x0000000000400000-0x000000000043D000-memory.dmp

        Filesize

        244KB

      • memory/4888-4-0x0000000002180000-0x000000000219B000-memory.dmp

        Filesize

        108KB

      • memory/4888-6-0x0000000000400000-0x000000000043D000-memory.dmp

        Filesize

        244KB

      • memory/4888-8-0x00000000021C0000-0x00000000021D7000-memory.dmp

        Filesize

        92KB