Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08/04/2024, 11:44

General

  • Target

    2024-04-08_ce653233db44f35f8acb0714a7dd6066_mafia.exe

  • Size

    486KB

  • MD5

    ce653233db44f35f8acb0714a7dd6066

  • SHA1

    e2f409c7a2d5caab782be13811a9be457471ff6c

  • SHA256

    b0c794bfcaf7e13cece24656d0575c609b7b34ec6bc551bb1898c21ab848476d

  • SHA512

    d33300d11069baea23036126e1332c7fdb3019bd399cbbfb33ccdd5e7f80de565708aa17a65ec5ba1a8a49e00bd8353e3b189754e62139778d36497c7559486f

  • SSDEEP

    12288:3O4rfItL8HPTAuP0EpwehrVwEnqdd67rKxUYXhW:3O4rQtGP0cpX9+d63KxUYXhW

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-08_ce653233db44f35f8acb0714a7dd6066_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-08_ce653233db44f35f8acb0714a7dd6066_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1784
    • C:\Users\Admin\AppData\Local\Temp\620D.tmp
      "C:\Users\Admin\AppData\Local\Temp\620D.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-04-08_ce653233db44f35f8acb0714a7dd6066_mafia.exe 78F1B701116E3661AA3FA36EC12FD2493902DB985E7029DC0B3C6799B819A03A6718A9DF8BC92BDF078ECA39BA47E4DAB882ECC33C630D36220C75EFC01065DF
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:3040

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\620D.tmp

    Filesize

    486KB

    MD5

    cc841120eb41352b9df5d33046752fc5

    SHA1

    4e0b4b2ecdc25bef98f69734171c9c74543e4498

    SHA256

    ad13b4c8800a08aeecb21eed6ceeec13ed1e33589f8892a8bb84b077d2347ee0

    SHA512

    ea1acf4be6f742cecc997fc460ea69becaa231eeff8547d0404631af9b78d29b574c000a015f85812021cb1aff40c5ae3ea789f55aab5b7798eeaf63b44fb1a8