Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 12:10
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-06_6747aa1e03e1949fa2f88ba6c53c8639_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-06_6747aa1e03e1949fa2f88ba6c53c8639_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-06_6747aa1e03e1949fa2f88ba6c53c8639_mafia.exe
-
Size
412KB
-
MD5
6747aa1e03e1949fa2f88ba6c53c8639
-
SHA1
afcd312d183f688c296263b5250f3d0da0626312
-
SHA256
0dd19dbc2ee0c429d046c5939eb9ac9adb93b6f61dfa9e784bb1c184919838de
-
SHA512
0834b7a94734ab9056f19f0c2ecfaa1f80c622b026aa188869053f203461dfa328f1ec471134d7660fcc2c4e70e8d78f9e8f3e1189b68a3064a2de98451babf7
-
SSDEEP
6144:UooTAQjKG3wDGAeIc9kphIoDZnp/JNAZ7Sqt89fiXOb43tKwzmi//RnP:U6PCrIc9kph5/kd4iRsN+P
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2044 5331.tmp -
Executes dropped EXE 1 IoCs
pid Process 2044 5331.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1560 wrote to memory of 2044 1560 2024-01-06_6747aa1e03e1949fa2f88ba6c53c8639_mafia.exe 16 PID 1560 wrote to memory of 2044 1560 2024-01-06_6747aa1e03e1949fa2f88ba6c53c8639_mafia.exe 16 PID 1560 wrote to memory of 2044 1560 2024-01-06_6747aa1e03e1949fa2f88ba6c53c8639_mafia.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-06_6747aa1e03e1949fa2f88ba6c53c8639_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-06_6747aa1e03e1949fa2f88ba6c53c8639_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\5331.tmp"C:\Users\Admin\AppData\Local\Temp\5331.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-01-06_6747aa1e03e1949fa2f88ba6c53c8639_mafia.exe 24A2222076B7D3B69DCF6AB9FDFAB83C993C1187391DBA8F30EB667F4732FE7FC82899B0CCB1EE85E9569A7513621CBEED1705C2A2D994BA0191ECBF8DB454942⤵
- Deletes itself
- Executes dropped EXE
PID:2044
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD5414160762353fda32c9e75228cbcde0f
SHA103813788efeac9df390d5ebfc37c3139dc4cc9bb
SHA2568be2eb34e896c89644ae5262d4490a43b34d71ebc7912258f83f76574afd19dc
SHA5127dd866a7b8c158478d92febe6d53fb2d0a2f2c927d95362d267ff0d8d2e0ab784a8658a7c37ba94985ecaf632b0c8c5c3d656c1a8cdfae87e89acfa0ebe380a0