Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/01/2024, 19:42

General

  • Target

    2024-01-24_1ec62e99d6ec493d013fb8280b194c8e_mafia.exe

  • Size

    414KB

  • MD5

    1ec62e99d6ec493d013fb8280b194c8e

  • SHA1

    98a9983b5697f125bbc5e41e8f9f8dd45e76e017

  • SHA256

    15d9c64df40d24e1a37b29e37164d0a12df8ceb0672523fba47f931371dc4444

  • SHA512

    482420fabf7b38c9db71d2a948ae5726ac34f5ce54ca485b2d0db90e9dab70f8d75dc469f233cb8b5b63baf33a9869fb48fa7ca71d3c0b6b5490ce1c64594a70

  • SSDEEP

    6144:Wucyz4obQmKkWb6ekie+ogU6BYB313yTAEwxKnqUjzHg7cobjJCpJBFeh+iT8Ulx:Wq4w/ekieZgU6s3EpRvubjJmH44iYUlx

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-24_1ec62e99d6ec493d013fb8280b194c8e_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-24_1ec62e99d6ec493d013fb8280b194c8e_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1272
    • C:\Users\Admin\AppData\Local\Temp\7FC.tmp
      "C:\Users\Admin\AppData\Local\Temp\7FC.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-24_1ec62e99d6ec493d013fb8280b194c8e_mafia.exe F8E7CF7AAFF9AF265D5D948DB66E23BDA4C165245E3A6464AF778EBD582D15B67EFD0FDF69D51CE40EF460B7CF26D0636A5C451CE8D032C49C9B690D83B29591
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2984

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\7FC.tmp

    Filesize

    414KB

    MD5

    93012cfdb08de85a326c5af9167a0a57

    SHA1

    78db0486550d75ac41695fde4cd241e5968a433d

    SHA256

    48ec6be97f023647011b59c0dd105d4e1c86d4e2bf32e3d3e224533dc96c8d43

    SHA512

    593dbabacb2d3297ae6237e3d85399498c96199669d225e30d621dc4820889194d07f52a742dc955673590eefbcf9ab9c4cbae29adbea71195933031925e058b