Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    173s
  • max time network
    180s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/01/2024, 05:56

General

  • Target

    2024-01-11_29519eddc78ebc01a4e995cc3fc7440b_mafia.exe

  • Size

    412KB

  • MD5

    29519eddc78ebc01a4e995cc3fc7440b

  • SHA1

    748cc1cc068119d0d1302f789ca6b3b89a203a3b

  • SHA256

    a020f21dbfb168cb589d0ce2c83caee59401a1354aac09fa4db5f56dc57742d3

  • SHA512

    ae9e66127e9a71379d61c16011fbdb8902632ef9029a4f218e6b38b873f69bf34a08200404e8c70b967cca1e6c01b622370f33009a40464e64ca9ff430f3d27c

  • SSDEEP

    12288:U6PCrIc9kph5YT769gbiuMqjhFEIViJJW:U6QIcOh5875vjtFLiJ

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-11_29519eddc78ebc01a4e995cc3fc7440b_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-11_29519eddc78ebc01a4e995cc3fc7440b_mafia.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Users\Admin\AppData\Local\Temp\DD02.tmp
      "C:\Users\Admin\AppData\Local\Temp\DD02.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-01-11_29519eddc78ebc01a4e995cc3fc7440b_mafia.exe EB9226A43E178CA927CEE799FFB0C8CB19E97CB408E1FE687338971950878686E808FE372BDF3F34DAA94E38AF69811E3AC9977439FCF5AC469028FDE82F1EAC
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:3976

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\DD02.tmp

    Filesize

    229KB

    MD5

    14eee34d9a967b9d0efd9493f3d7a18a

    SHA1

    8d49ae42248b8c446d1ca8a1be3e8626f7eda37d

    SHA256

    5dd2d9b93ea39492601beaf8da2f6d1561899fe1575cefd1a7e7bb233f11132c

    SHA512

    01841472694b806fb1344c09531836a5c59a3113e72c21387e26d1e6a3220f92b7c3278c62a95c2b96dfba9bec5f21ea3e191f58f031a7e6831636d01101a25f

  • C:\Users\Admin\AppData\Local\Temp\DD02.tmp

    Filesize

    186KB

    MD5

    0eb1a9e63ae5dc671755bd3e14a816ac

    SHA1

    07fbe193897c5d67d5cffa04fd44617b512ba11c

    SHA256

    28a77894f11cf06c60b81bbac24dc9c284eccf45cdbf968ca3bfbb97e9361207

    SHA512

    d7b87dbca142078031d24a3917be96c957f423af7d93ad5f8e50260aca2c2aca8442101a636e8db1b3237794324c4381c11e80f5cb0495c56d22a743b815e0a4