Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
23/10/2023, 19:45
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-07_c58e003f23819fbe11ac0706dfa1b019_mafia_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-07_c58e003f23819fbe11ac0706dfa1b019_mafia_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.2023-09-07_c58e003f23819fbe11ac0706dfa1b019_mafia_JC.exe
-
Size
412KB
-
MD5
c58e003f23819fbe11ac0706dfa1b019
-
SHA1
85875a41cbf6379fee95106f7a5506b4af780d3e
-
SHA256
de7450bbeb19fb9d3c83d02d881191ec20197b840719b3e00de96a1f4d788aa6
-
SHA512
6d7565826a5c29550a47b4c9945c938d09105090be17492f7f8d90582272da4e5f531606464f27e34ade0f18b3a26bb9bc35af8fbc6c986b25e3a8d6cb24c619
-
SSDEEP
12288:U6PCrIc9kph5mWfhX8uMEqEEY66BMhNgLU/QiQ:U6QIcOh5memEEfgLU/Qi
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2448 56C7.tmp -
Executes dropped EXE 1 IoCs
pid Process 2448 56C7.tmp -
Loads dropped DLL 1 IoCs
pid Process 1952 NEAS.2023-09-07_c58e003f23819fbe11ac0706dfa1b019_mafia_JC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2448 1952 NEAS.2023-09-07_c58e003f23819fbe11ac0706dfa1b019_mafia_JC.exe 28 PID 1952 wrote to memory of 2448 1952 NEAS.2023-09-07_c58e003f23819fbe11ac0706dfa1b019_mafia_JC.exe 28 PID 1952 wrote to memory of 2448 1952 NEAS.2023-09-07_c58e003f23819fbe11ac0706dfa1b019_mafia_JC.exe 28 PID 1952 wrote to memory of 2448 1952 NEAS.2023-09-07_c58e003f23819fbe11ac0706dfa1b019_mafia_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-07_c58e003f23819fbe11ac0706dfa1b019_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-07_c58e003f23819fbe11ac0706dfa1b019_mafia_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\56C7.tmp"C:\Users\Admin\AppData\Local\Temp\56C7.tmp" --pingC:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-07_c58e003f23819fbe11ac0706dfa1b019_mafia_JC.exe 16E2FC750B75633B93F9739D0BFFC235D9892EC29D70C06991B5F5988408382C0C2698091B0A24997574EB64668A03E34817362BFA9B02F477E18076663DA4DB2⤵
- Deletes itself
- Executes dropped EXE
PID:2448
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD51c44e5d03574da5d84443b3e0d16b119
SHA12b8e0cd0ffa36d6751ced8d9cddfe939406be8b2
SHA256ea8e356ad2fff9a17ef007507f46f1f1c11e3cc9d35d244932be7d086e4085b3
SHA51210d647a9ecf46d23065bda8b2e6cca77c05b422f27a0cc22ce3461597ae9019c2849897ba530eb30e5c6f4c653746bfe60e02dbbcb3de1cee15ed3cecd74b2f7
-
Filesize
412KB
MD51c44e5d03574da5d84443b3e0d16b119
SHA12b8e0cd0ffa36d6751ced8d9cddfe939406be8b2
SHA256ea8e356ad2fff9a17ef007507f46f1f1c11e3cc9d35d244932be7d086e4085b3
SHA51210d647a9ecf46d23065bda8b2e6cca77c05b422f27a0cc22ce3461597ae9019c2849897ba530eb30e5c6f4c653746bfe60e02dbbcb3de1cee15ed3cecd74b2f7