Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15/03/2024, 20:36

General

  • Target

    2024-03-15_d162efc0da44e37eb859bc86163f225e_mafia.exe

  • Size

    444KB

  • MD5

    d162efc0da44e37eb859bc86163f225e

  • SHA1

    cd4060b762d2546c45366759a03e14616e8465da

  • SHA256

    a445739541b67e2ba448ca1c9103b26d13eb89d2e4eecf876b565d846ecc744d

  • SHA512

    dbb2cece4c5cfea1e68992b009e0e4ddcac214f6b84720e1683a987a3047357abbdb74c6cabb815c40bac95247b3e6c3ad2563094c3ff47028296c9ee6c30d98

  • SSDEEP

    12288:Nb4bZudi79LPMH3brpWIKkXS1ggg6DZBbkLXzQA:Nb4bcdkLPMHLVydggg6tyX

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-15_d162efc0da44e37eb859bc86163f225e_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-15_d162efc0da44e37eb859bc86163f225e_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Users\Admin\AppData\Local\Temp\D1B.tmp
      "C:\Users\Admin\AppData\Local\Temp\D1B.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-03-15_d162efc0da44e37eb859bc86163f225e_mafia.exe 3F5C5F0F4177C583F3C25F2D838E00E40BF7AFCC91602CD293820E9624DC5EAFD7173629123A4098D8AB7208B258326D94B44507C19BC6943C407481F494B29D
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1716

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\D1B.tmp

    Filesize

    444KB

    MD5

    35253fa81b2a2bd7b3f058a8992e8125

    SHA1

    ef51f52acfcb8bf20856b0e9ff51cec20295c4fc

    SHA256

    03847926bd2d1469ed3d77a7f2937bb17903f4ff88e9bb0596957e1843a0d8ba

    SHA512

    c7b523f28c583a602df9041830205ab9ba58d641cb1dbcc8c9d815af6f74037770d4933bf1f8e5ab104e11d3e832e525033b091f34c2e3205f77cfa06edf52d6