Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
05/08/2023, 13:08
Static task
static1
Behavioral task
behavioral1
Sample
700d5d5544647369c77816989579dc55_mafia_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
700d5d5544647369c77816989579dc55_mafia_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
700d5d5544647369c77816989579dc55_mafia_JC.exe
-
Size
412KB
-
MD5
700d5d5544647369c77816989579dc55
-
SHA1
f3b138e48e635afdcbc4ade28b209b7339e76129
-
SHA256
bb2add91540dee429f9449f6b50a2a030f770abc277d24102cb7a745e1159a8a
-
SHA512
faf82dff065eb3ba126371a6861cf745ecb3270ecc54be4a2e9a41845a6e879658d00fbde271fb7da9cc6aeec3078392b6cb00bc58ec87ad3493cd91b92fe134
-
SSDEEP
6144:UooTAQjKG3wDGAeIc9kphIoDZnAe+RD6GT1PwIeeYo2dEqTXp59AO5P:U6PCrIc9kph5S5pT1PANdEq559pJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3420 1345.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4868 wrote to memory of 3420 4868 700d5d5544647369c77816989579dc55_mafia_JC.exe 82 PID 4868 wrote to memory of 3420 4868 700d5d5544647369c77816989579dc55_mafia_JC.exe 82 PID 4868 wrote to memory of 3420 4868 700d5d5544647369c77816989579dc55_mafia_JC.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\700d5d5544647369c77816989579dc55_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\700d5d5544647369c77816989579dc55_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\1345.tmp"C:\Users\Admin\AppData\Local\Temp\1345.tmp" --pingC:\Users\Admin\AppData\Local\Temp\700d5d5544647369c77816989579dc55_mafia_JC.exe 2B81AD0A438BC1CC2AA8C57FFE9023A9D3932D170B4C627E4953001BA01C4458A2B159DBA7C26A7186D2216FE9A1B7CA5644E744CEF9CF9A1746BC853C8A7E932⤵
- Executes dropped EXE
PID:3420
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD5d3941a444fdb0e7b078c1c021d2b729f
SHA1cc4102346430f84060c0bc2f46b93e754da58df1
SHA2567196c5945dd01065b51ed4da482728275f30a8b1352d3ee9062a4da82a361d7e
SHA512673522e097340a811e6a1cf9b2e69b8471c97f9b70bd5f2a01b57e31bc7ea78445bdc191e5ba62dc37e729fefabbe658ddc25587168122e394dd89ff657afce2
-
Filesize
412KB
MD5d3941a444fdb0e7b078c1c021d2b729f
SHA1cc4102346430f84060c0bc2f46b93e754da58df1
SHA2567196c5945dd01065b51ed4da482728275f30a8b1352d3ee9062a4da82a361d7e
SHA512673522e097340a811e6a1cf9b2e69b8471c97f9b70bd5f2a01b57e31bc7ea78445bdc191e5ba62dc37e729fefabbe658ddc25587168122e394dd89ff657afce2