Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 05:48
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-10_34c0044dee04253964e0d8ec3c9cd739_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-10_34c0044dee04253964e0d8ec3c9cd739_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-10_34c0044dee04253964e0d8ec3c9cd739_mafia.exe
-
Size
535KB
-
MD5
34c0044dee04253964e0d8ec3c9cd739
-
SHA1
a84e1c388b52801a1c16b85daef3e3b01ea5336a
-
SHA256
cfc179787a2c853d906c0e301b5d3c456b8823230b03e0fed78030a705b34a76
-
SHA512
88df2dfb899cdad27dfbef9abe17aeb0ab74438b850772860c55fb021796e9b0907ba0ebb5e5350d3e59a7b9d6cbba1727c3b27766e916ff65723c07ba8d0f78
-
SSDEEP
12288:si4g+yU+0pAiv+CrxR5C07Y0HeqFuK8mWxUlvjosTdcG93Dn:si4gXn0pD+axR5NY0Hea8UlvjRhFJ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 55E0.tmp -
Executes dropped EXE 2 IoCs
pid Process 4240 55E0.tmp 3988 2024-01-10_34c0044dee04253964e0d8ec3c9cd739_mafia.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4240 55E0.tmp -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3444 wrote to memory of 4240 3444 2024-01-10_34c0044dee04253964e0d8ec3c9cd739_mafia.exe 31 PID 3444 wrote to memory of 4240 3444 2024-01-10_34c0044dee04253964e0d8ec3c9cd739_mafia.exe 31 PID 3444 wrote to memory of 4240 3444 2024-01-10_34c0044dee04253964e0d8ec3c9cd739_mafia.exe 31 PID 4240 wrote to memory of 3988 4240 55E0.tmp 94 PID 4240 wrote to memory of 3988 4240 55E0.tmp 94 PID 4240 wrote to memory of 3988 4240 55E0.tmp 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-10_34c0044dee04253964e0d8ec3c9cd739_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-10_34c0044dee04253964e0d8ec3c9cd739_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\55E0.tmp"C:\Users\Admin\AppData\Local\Temp\55E0.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-10_34c0044dee04253964e0d8ec3c9cd739_mafia.exe 0DA139D78BE75BED20C56FAD62A816DD297D550A01EE646D528C9FEFE960A772EA45B93864C19AB9949F71088C7692F85B55748585470A089361954509868D6A2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\2024-01-10_34c0044dee04253964e0d8ec3c9cd739_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-10_34c0044dee04253964e0d8ec3c9cd739_mafia.exe"3⤵
- Executes dropped EXE
PID:3988
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD5b7fd76103054f562a11ce616d50a0611
SHA17473656e5a33b9ecc401985f917f65054bcbd16c
SHA256aba5c0bff0442597ff8743b4fe7d28de945b78be01eb88fc4a95cadd1fbee409
SHA5122a2996476dbfdcd50c39c08dc91a179eff4f016013707c9c0972c6e7a0e179b9da4fcff5e2d4d4883a31312bfefdb9a88d1490e1baaa4728a516c5c7f7bdfbd2
-
Filesize
291KB
MD568e8350cb1387164366246516bb4832e
SHA10d35e3f27456ae483f0c2377658ebeb5c55483ee
SHA256ece986dffc646886b360a07895daec0f96b7679c37e5e7988a4227ad5ab0a211
SHA512ad7cb20c7c0ba9112eacb3b8e79f69ebebb56044cc4145c1c6a4337d64ac8c9220503e869eab2c224eff85fce2bfbbc8f9ba84e59b827f934d87e9aa24b1606d
-
Filesize
308KB
MD53ff0107ca464ce95300f197098c35f22
SHA1f6fa0791f33b4b939b581f383a7b5ef5aeb3236c
SHA256064d9366aaaf1a8753930b777f32f8d4ba4721a3b6073fec2ab11fe1c5021341
SHA5124c6d26f7e896237afdfc4fb21f36b682ee15483a5595808705771d3ed333fd85f538663785f7ca4c8a9d09aed5a880c28bcf8a843e5861274be012b11f3d8f87