Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/03/2024, 22:24

General

  • Target

    2024-03-07_17864ad5e0e4e7f45bd1a29bd654f64b_mafia.exe

  • Size

    325KB

  • MD5

    17864ad5e0e4e7f45bd1a29bd654f64b

  • SHA1

    b97fc772ef9524d6772bf0d1b41ee1322bf0fd99

  • SHA256

    e72187199171888f54c9f8db8e23171d4798bcb88207947400541eaf71def255

  • SHA512

    80ebb266eb378c5438c770066e85b165e5a305137837787d7bb62dafee39385f1a8c898dc9a53fea9803e6fca6e88847890b750a90686c96dd9ce84089d2aa75

  • SSDEEP

    6144:L5OGTnncBQmBCjTlOgLA3tjp7OEyXk0Lk3dgvXr:9BTwrBCjTcgLA33aEyUak3dgvb

Malware Config

Signatures

  • GandCrab payload 2 IoCs
  • Gandcrab

    Gandcrab is a Trojan horse that encrypts files on a computer.

  • Detects Reflective DLL injection artifacts 2 IoCs
  • Detects ransomware indicator 1 IoCs
  • Gandcrab Payload 2 IoCs
  • Program crash 1 IoCs
  • Suspicious use of SetWindowsHookAW 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-07_17864ad5e0e4e7f45bd1a29bd654f64b_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-07_17864ad5e0e4e7f45bd1a29bd654f64b_mafia.exe"
    1⤵
    • Suspicious use of SetWindowsHookAW
    PID:5152
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 5152 -s 480
      2⤵
      • Program crash
      PID:5852
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5152 -ip 5152
    1⤵
      PID:5108

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/5152-0-0x0000000005910000-0x000000000592B000-memory.dmp

      Filesize

      108KB

    • memory/5152-1-0x0000000000400000-0x0000000003BA2000-memory.dmp

      Filesize

      55.6MB

    • memory/5152-3-0x0000000005940000-0x0000000005957000-memory.dmp

      Filesize

      92KB

    • memory/5152-7-0x0000000005910000-0x000000000592B000-memory.dmp

      Filesize

      108KB