Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    18/02/2024, 13:31

General

  • Target

    2024-02-18_47920c402258e6c1f90510c3c4a16b01_mafia.exe

  • Size

    473KB

  • MD5

    47920c402258e6c1f90510c3c4a16b01

  • SHA1

    8ef17c9ef42bd5fc8fd3fe86b3cd1b30cb35dc57

  • SHA256

    788c5dea1bf267b320aa15caa8c3452cb9d4387e4374bbe7d7f2dd2ecbed6348

  • SHA512

    988f3924e0d8f5b14220705b002a8278e4bd532df58e3878a78bec3631a8af6056bc2f413680686413d77732e47eb1c87ca48419dc9cfc04c5784d3aa6a79bce

  • SSDEEP

    6144:fFrJxvldL4c5ONK1xgWbd1s79+iStsiOhXthcLg2OSLnE9P0+Sf5JJLj3oiXk4Lq:Nb4bZudi79LzRthcLggrE9PYzsJRqA0a

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-18_47920c402258e6c1f90510c3c4a16b01_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-18_47920c402258e6c1f90510c3c4a16b01_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2476
    • C:\Users\Admin\AppData\Local\Temp\36C9.tmp
      "C:\Users\Admin\AppData\Local\Temp\36C9.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-18_47920c402258e6c1f90510c3c4a16b01_mafia.exe CF15D5E696941D6AF337F62A368C416CF6CCA0BA858656A34BC50FA974149AC346E332C86068AADC43561A94066F62E91FEE75DB90D5A5BA0FD9900693CCD675
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2296

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\36C9.tmp

    Filesize

    473KB

    MD5

    e808f78ff02dcdb773d9111cfe2a95aa

    SHA1

    31168c66064f0f0740174d110fb9a992efebbc6f

    SHA256

    40487ebad56af6b88d6ec77ea698b46e84ec3a14ddd994d6c9afb270f1936aee

    SHA512

    b14c9252668168f63b86513b5f623de517b375e6679d183aaaaccc4e046ddbce2e15e72ad0d9c03f8d4c8e36cc5e1e2d9386e6d3e57374d00c75d27c1947450f