Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2024, 11:56

General

  • Target

    2024-03-28_e91423336546e33f893fc0b65d17105c_mafia.exe

  • Size

    468KB

  • MD5

    e91423336546e33f893fc0b65d17105c

  • SHA1

    6d35c4e578aaafd999a2eee0a7eae6633f56cf00

  • SHA256

    e4fd66803e7b3083c3a79d9bddb5cd5147413eb092fb34ca57b3d5656239ddcb

  • SHA512

    cc0023ed4714b5c5035911eeff288c51749d0a981ffd9421dc1ddebf7c7cb9198413ee47a2a716b5c7335b91d6c634bfbf5f951a34a06af236640324de05a6b5

  • SSDEEP

    12288:qO4rfItL8HG67Yysa3Y52hpozp+yPJ7bWmeEVGL:qO4rQtGGhZSYW+plJumeEVGL

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-28_e91423336546e33f893fc0b65d17105c_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-28_e91423336546e33f893fc0b65d17105c_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:936
    • C:\Users\Admin\AppData\Local\Temp\4653.tmp
      "C:\Users\Admin\AppData\Local\Temp\4653.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-03-28_e91423336546e33f893fc0b65d17105c_mafia.exe BFA0E8F5E9465F4681A5CBE3FBA9DB7F812B4AB66D17728C161AD0845DAC85C2C718D5177958388F298544FFC93CA779EB22E4A037A7D4DA089D9843A8D372BE
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1756

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\4653.tmp

    Filesize

    468KB

    MD5

    4cce044db4d90d9005c09335d499cb4f

    SHA1

    1721774898e3a5c721fb645fda1f54b83d6b1d1e

    SHA256

    9f89433420657e52b279e93738c68eb2ed6889c38e42e53f70e674c80522e159

    SHA512

    367b5cb113e4df4bdf82e53d0d1d19e9f62bf354a319ab5529056729f6047804c9445bb3f71d17f58fac5026977851eebbc26e35d47a3065b3cebc4a1d8d0bee