Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
22/10/2023, 08:48
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-05_37ee5b71460f3ce99fc16667a675c4dc_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-05_37ee5b71460f3ce99fc16667a675c4dc_mafia_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.2023-09-05_37ee5b71460f3ce99fc16667a675c4dc_mafia_JC.exe
-
Size
465KB
-
MD5
37ee5b71460f3ce99fc16667a675c4dc
-
SHA1
5a09c1fc7dd1abac5c8e9ab0db09c7d6c85f6502
-
SHA256
2962454443c5157ad4838a503ff7af7722830887179101f570aad07cd814b5fc
-
SHA512
63f42ada1f67403ddba3643429b74afaac56f839bd0d6989886b4c3a4013b84d1527f3ff7aa1d4bce0d102ea53d43feedf4fcba4cad2683985fdee86ce6458dc
-
SSDEEP
12288:Bb4bZudi79LOQ9IO8X+y+RGtsOkCJKyA:Bb4bcdkLOQHdyhsOkCJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1360 C062.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3664 wrote to memory of 1360 3664 NEAS.2023-09-05_37ee5b71460f3ce99fc16667a675c4dc_mafia_JC.exe 85 PID 3664 wrote to memory of 1360 3664 NEAS.2023-09-05_37ee5b71460f3ce99fc16667a675c4dc_mafia_JC.exe 85 PID 3664 wrote to memory of 1360 3664 NEAS.2023-09-05_37ee5b71460f3ce99fc16667a675c4dc_mafia_JC.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-05_37ee5b71460f3ce99fc16667a675c4dc_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-05_37ee5b71460f3ce99fc16667a675c4dc_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Users\Admin\AppData\Local\Temp\C062.tmp"C:\Users\Admin\AppData\Local\Temp\C062.tmp" --helpC:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-05_37ee5b71460f3ce99fc16667a675c4dc_mafia_JC.exe B656BF8D5D7B34C9A8D7231E3CF971D9A74623DD3E5221230D2520CD9EA24ADE60E3D6197F9C2CB1D32A536FC119B0557815DBBD32EA58C7033DA6BB15644C132⤵
- Executes dropped EXE
PID:1360
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
465KB
MD5db751de79a1f68cad9133c38ba02e4f4
SHA10e7ffdbe3bd17a25ad0f2bdebcb2ad27f47bd7b1
SHA256abc76ffdf5a410be11d8c5fcb25499e7e195ee5bb6ee0620f2cd08cc075314f0
SHA5127e7cea708227cfc2b9c53382c3be06dd5a0495fe36d57ef38a95ae3ee27cee42c322315137943a42d34aad95d21b66b1ecee1b62bc903eb6da84a885d14ff3eb
-
Filesize
465KB
MD5db751de79a1f68cad9133c38ba02e4f4
SHA10e7ffdbe3bd17a25ad0f2bdebcb2ad27f47bd7b1
SHA256abc76ffdf5a410be11d8c5fcb25499e7e195ee5bb6ee0620f2cd08cc075314f0
SHA5127e7cea708227cfc2b9c53382c3be06dd5a0495fe36d57ef38a95ae3ee27cee42c322315137943a42d34aad95d21b66b1ecee1b62bc903eb6da84a885d14ff3eb