Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13/02/2024, 20:28

General

  • Target

    2024-02-13_4a476cbf17e67158b6f9196178ddf986_mafia.exe

  • Size

    486KB

  • MD5

    4a476cbf17e67158b6f9196178ddf986

  • SHA1

    e65dc327ec5fc3c019aeb423964827f0994d5def

  • SHA256

    e00a6331a594b9aff763a3627e706066c010739e2ce46352d62660b63c8898eb

  • SHA512

    18e818e764db931349d002e603075f84f332dcb9b58570a1a2374ddb2ddc2655d6c1ab9b4fa17ae639fb68dc0d9b08cce89683cb5155d0c97cdf70ccb4128397

  • SSDEEP

    12288:3O4rfItL8HPsxSltuZA+2fWcs2/9rJButKnlY7rKxUYXhW:3O4rQtGPESIWfWcF9rJY4y3KxUYXhW

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-13_4a476cbf17e67158b6f9196178ddf986_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-13_4a476cbf17e67158b6f9196178ddf986_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Users\Admin\AppData\Local\Temp\9CAD.tmp
      "C:\Users\Admin\AppData\Local\Temp\9CAD.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-13_4a476cbf17e67158b6f9196178ddf986_mafia.exe AA49E93EF42A391BC26902C83E34F149A90B9244B8F5E5ED4384E1ECB08291247BF84C913455F3EED224DA8181CA5D47FB861A9714E075F00E142C25D0713998
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1968

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\9CAD.tmp

    Filesize

    486KB

    MD5

    6c3ac47ab747353d5421542cabc8ef73

    SHA1

    f10babd35358f709b8fdb92ae23e444f34f470a6

    SHA256

    e146640e52fee947fe63cb7b03fd2386e8ce3eb4fdca8a5e76b1b53e5eead085

    SHA512

    d615cb53e75dc9c57070b895237847139d5ace58bca70050ab6a2d3c3f8bdcac0a6dacd041b5025f932dc4b4cdc8367873d6a91c8e21bfa9077e55a06bc922db