Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
03/08/2023, 15:08
Static task
static1
Behavioral task
behavioral1
Sample
47f42eed77718e0ae46afb5b057be1a5_mafia_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
47f42eed77718e0ae46afb5b057be1a5_mafia_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
47f42eed77718e0ae46afb5b057be1a5_mafia_JC.exe
-
Size
428KB
-
MD5
47f42eed77718e0ae46afb5b057be1a5
-
SHA1
fbe282b133bc21310a090e5ca82c64770f6497f9
-
SHA256
2f67fdafc50b939f3bde12489b3ce5d73c83b663507195c5b04cb11406d7af0f
-
SHA512
91cc030745247e997f2d01a5b0cef3212b956c94cdd81bf9e8072a014bb1562635fdf4e11ae005e3cadc0ae671a924c0a5f39513ab108b3d2a95ddabc44f180e
-
SSDEEP
12288:Z594+AcL4tBekiuKzErbxi/UKVXYizgWq8/jl:BL4tBekiuVrbgRV3D
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2896 6EB8.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2728 wrote to memory of 2896 2728 47f42eed77718e0ae46afb5b057be1a5_mafia_JC.exe 85 PID 2728 wrote to memory of 2896 2728 47f42eed77718e0ae46afb5b057be1a5_mafia_JC.exe 85 PID 2728 wrote to memory of 2896 2728 47f42eed77718e0ae46afb5b057be1a5_mafia_JC.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\47f42eed77718e0ae46afb5b057be1a5_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\47f42eed77718e0ae46afb5b057be1a5_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\6EB8.tmp"C:\Users\Admin\AppData\Local\Temp\6EB8.tmp" --helpC:\Users\Admin\AppData\Local\Temp\47f42eed77718e0ae46afb5b057be1a5_mafia_JC.exe AF2D7B173E393735B15255115220CDF3FA4039BE2DDDBDB86445D1693D78EC0BCD3B79137EED74A2E5E237F11B8F746EAB6685112E145BF3FB85CA9AE0E9587D2⤵
- Executes dropped EXE
PID:2896
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
428KB
MD56192b84cc1ebf64d51fb0214c3dc3da8
SHA109ad58ecb4a02e78bbbfca6340c7a68c3901579f
SHA256a8c6dbd37cddacc2d913dadb67e26cdd2c92a0f96a6d313c6062c6567790a0b8
SHA5125971e9e993c094130bcc32227c1fa6798291feecf0a55a8150dd13e3c9b877f67e5724611fe243c29f8891e02afbbf9fbecdf577088432e199cccc6ac3828709
-
Filesize
428KB
MD56192b84cc1ebf64d51fb0214c3dc3da8
SHA109ad58ecb4a02e78bbbfca6340c7a68c3901579f
SHA256a8c6dbd37cddacc2d913dadb67e26cdd2c92a0f96a6d313c6062c6567790a0b8
SHA5125971e9e993c094130bcc32227c1fa6798291feecf0a55a8150dd13e3c9b877f67e5724611fe243c29f8891e02afbbf9fbecdf577088432e199cccc6ac3828709