Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
159s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 05:48
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-10_3e4f63c906030607a612b7dd1e4537f7_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-10_3e4f63c906030607a612b7dd1e4537f7_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-10_3e4f63c906030607a612b7dd1e4537f7_mafia.exe
-
Size
479KB
-
MD5
3e4f63c906030607a612b7dd1e4537f7
-
SHA1
1d906b8c8a1813f4d04aa75700c216e5069709e1
-
SHA256
518366acd7c49e2d920b4273d24096d79a59d1a36f15f81e252111571d3c9917
-
SHA512
063c741c86e9b75fe7660c7b5da8da577ac0f9f8e71d72cc282a43f47d578f828dc27d0314458490f9765eeec457709658af8411ff1e3b21aadc674f931691fe
-
SSDEEP
12288:bO4rfItL8HAIkrzfo0m82mmy5r44OHWEENsMIgMcReKQ75UO:bO4rQtGADzd2mtqGMcReDVUO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4040 2287.tmp -
Executes dropped EXE 1 IoCs
pid Process 4040 2287.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3104 wrote to memory of 4040 3104 2024-01-10_3e4f63c906030607a612b7dd1e4537f7_mafia.exe 91 PID 3104 wrote to memory of 4040 3104 2024-01-10_3e4f63c906030607a612b7dd1e4537f7_mafia.exe 91 PID 3104 wrote to memory of 4040 3104 2024-01-10_3e4f63c906030607a612b7dd1e4537f7_mafia.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-10_3e4f63c906030607a612b7dd1e4537f7_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-10_3e4f63c906030607a612b7dd1e4537f7_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\2287.tmp"C:\Users\Admin\AppData\Local\Temp\2287.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-10_3e4f63c906030607a612b7dd1e4537f7_mafia.exe D584E904E16941C8F13F4D49817FADCE9A4AC2956C7E7EBDBC27192A21FC9AD0C4D046957191AC6E3C2A1D2FCF6EDD141EC29ABC8CB96E5E10CC3CE92BCECB502⤵
- Deletes itself
- Executes dropped EXE
PID:4040
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
479KB
MD56770149aabf266a157cd2cd9df517e8e
SHA17f6230e9b3648a2ea7925851795a8e7e9df05813
SHA256efd209e826117e327eb73f82d1db39b766b9875b50495d0184a0193520191973
SHA5123b3c993da187e830242bad0c3d1d9eb7dcd13524c94ec7337d1a6ae00db659f2f677de06f40d9d4b6c5bb1616f44858e5fc0528fddbe3d46da688f7b660dcbe1