Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    06/03/2024, 02:25

General

  • Target

    2024-03-06_38f0a7c3ead3aa487c7adb07e947953f_mafia.exe

  • Size

    468KB

  • MD5

    38f0a7c3ead3aa487c7adb07e947953f

  • SHA1

    4577034105bb1c530d3582c568733b44bb3270b4

  • SHA256

    7e206c080023457728501218594fb5a08b70a66a87b439481fd0dc17611d8612

  • SHA512

    5552faa80f794b748245b98e80220c5ed57d83282f7e955a4f034cbb55d0445ba00945742eb2f2e725d0dd647265aac602a83380abf9e35cb5cfacd46e016c17

  • SSDEEP

    12288:qO4rfItL8HGQeVmFCNJzNIfzN27bWmeEVGL:qO4rQtGGVVmmbILN2umeEVGL

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-06_38f0a7c3ead3aa487c7adb07e947953f_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-06_38f0a7c3ead3aa487c7adb07e947953f_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2964
    • C:\Users\Admin\AppData\Local\Temp\ED0.tmp
      "C:\Users\Admin\AppData\Local\Temp\ED0.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-03-06_38f0a7c3ead3aa487c7adb07e947953f_mafia.exe B4163A81981013C0905125868DA9FA2B57CE3F480F4BF69CBD8436969FDE7DCC9DDA8C6ED5EF9C940C72FB8A5E4F998340627EC58C0274FC123EF8AEF9CDE8D7
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2816

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\ED0.tmp

    Filesize

    468KB

    MD5

    f58c859dd20e3be1b3f48e59b0a91be5

    SHA1

    6d8b0f8c41a612085cf475691ce6ada7cf6ee22a

    SHA256

    f7cd927227ecf64b5a26728e10c6a835a11235bce8bdc766cc965a187d589453

    SHA512

    60d1287cddcccb9c0f737b59c4db9ebd8269a609896be89cc84e4a40115f38363af940d75da85b8b514a513574e75d4b344c0d140d9e74a3a6bbaf82e1413e61