Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 06:49
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-08_ddb710370646b7e6cf35fcc5e009db9a_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-08_ddb710370646b7e6cf35fcc5e009db9a_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-08_ddb710370646b7e6cf35fcc5e009db9a_mafia.exe
-
Size
414KB
-
MD5
ddb710370646b7e6cf35fcc5e009db9a
-
SHA1
7d3b9eac1c311d72bceb7faa302cb790b5b2cc1d
-
SHA256
07aa582d60f311429fcf253f0186597c2be347ffe6f8cfc8d4d9b0ff8127c8bb
-
SHA512
1f69546cd3c9f76b988d695e29c44b5ba1000a8e8eae33349fa2006c5516a93b84b5edbbe815937b1815849194872a8795553278d9a774439b1b01713c64d8c1
-
SSDEEP
6144:Wucyz4obQmKkWb6ekie+ogU6BYRG2YT04dGAxlkS7USlfkMPzq5Rt7kWHRkto8lx:Wq4w/ekieZgU612i0UhbkM7q5R1ktjlx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2484 FE84.tmp -
Executes dropped EXE 1 IoCs
pid Process 2484 FE84.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2484 3004 2024-01-08_ddb710370646b7e6cf35fcc5e009db9a_mafia.exe 89 PID 3004 wrote to memory of 2484 3004 2024-01-08_ddb710370646b7e6cf35fcc5e009db9a_mafia.exe 89 PID 3004 wrote to memory of 2484 3004 2024-01-08_ddb710370646b7e6cf35fcc5e009db9a_mafia.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-08_ddb710370646b7e6cf35fcc5e009db9a_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-08_ddb710370646b7e6cf35fcc5e009db9a_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\FE84.tmp"C:\Users\Admin\AppData\Local\Temp\FE84.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-08_ddb710370646b7e6cf35fcc5e009db9a_mafia.exe 2FF1280B0B561193E2E751422BC3A886293A56938A6812D7118D96CE41AB8E35E851F353E78C0713DA2AED61769D5A9B6DB364E89550E99142A66A0F1B71F41A2⤵
- Deletes itself
- Executes dropped EXE
PID:2484
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
414KB
MD5dd0daa9d82ae1807c024e3470b256480
SHA10b7da3a59d507f06a5163d74b6bcbb5f9fbd8576
SHA256c4f77ade3fd751f58b320b6456bb51f535e162ae117eb76420cd304f3386b756
SHA5122b658b3b30e4e05003bf20987fa36595665bba5ad6b526a5c43e6d3c078c43024b00ab7cc943807c6fcd48a4f4355bc7e3b6f142b26e4ac483dea1272589883c