Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    06/04/2024, 02:29

General

  • Target

    2024-04-06_28116b9f74cdb37f67193d860786398a_mafia.exe

  • Size

    433KB

  • MD5

    28116b9f74cdb37f67193d860786398a

  • SHA1

    0ca1a4954a7ad1aaa55c27105dd93ffc582c5c9f

  • SHA256

    ed4e93f06aab7051c4618961133d6e405a39b5bea2416374d21770f3a4988a65

  • SHA512

    9c51e7362527544eff89cfde71f665ef118672ee18bcb8107d5001fda87854a04f5b66ec024c7c5b495154d262f687ff71418498d81b9ef407e8457c86ea71bb

  • SSDEEP

    12288:Ci4g+yU+0pAiv+xL1+hB90J0p4ZAqF3vl0OKVcsn:Ci4gXn0pD+xL1+hB9gZACKrc8

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-06_28116b9f74cdb37f67193d860786398a_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-06_28116b9f74cdb37f67193d860786398a_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Users\Admin\AppData\Local\Temp\E43.tmp
      "C:\Users\Admin\AppData\Local\Temp\E43.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-04-06_28116b9f74cdb37f67193d860786398a_mafia.exe F0EF6AA7AE9F626E39DA238D484D0FB5FE6FEB4AADDA9AC66F2CFA9A0AB4ACB0BD18E52F3C1AC9D6F8919D6232EBE539C28B136CEFCCD5DF0BF2C7226C88659E
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2684

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\E43.tmp

    Filesize

    433KB

    MD5

    6f43bbfa0f74e8b71fbd6d9bc059b11f

    SHA1

    169cd5b93b0c9dcb0d2d96ba0a1da5dc07d8ac88

    SHA256

    2735411373d43e864a551bb0ca69b6f9845b90304b2f755f7b1d04ddaa412057

    SHA512

    565d31f0dad0f35c41537339d50d5b351697c4a174b0de51203c5852300803352cc04eb81d01eee09bfeee7fd493c796620ddbc96636f084131505d5cd1dabf6