Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 05:55
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-10_b0ed58137bec6d75102b6976d306da33_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-10_b0ed58137bec6d75102b6976d306da33_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-10_b0ed58137bec6d75102b6976d306da33_mafia.exe
-
Size
428KB
-
MD5
b0ed58137bec6d75102b6976d306da33
-
SHA1
77cbff4fde1f0d96823af5a8e88e470f931534f9
-
SHA256
6f1da6292586fa2b7c0c66954d6586bb3c23c9f11b86a0e289ad94df28d85592
-
SHA512
f94c39012ba1ad4cf31723930408f7fdeb256a36ea7867b8872a223d9e3b9f952d729f20e4efd9ef37068222c7fb1efc7d999ab9ed4d7d4226ec37553f411b3c
-
SSDEEP
12288:Z594+AcL4tBekiuKzEr1x8wxokdvD8vk0R2+1U0il0l:BL4tBekiuVrv8BC48G25l0
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1152 9C6F.tmp -
Executes dropped EXE 1 IoCs
pid Process 1152 9C6F.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4308 wrote to memory of 1152 4308 2024-01-10_b0ed58137bec6d75102b6976d306da33_mafia.exe 91 PID 4308 wrote to memory of 1152 4308 2024-01-10_b0ed58137bec6d75102b6976d306da33_mafia.exe 91 PID 4308 wrote to memory of 1152 4308 2024-01-10_b0ed58137bec6d75102b6976d306da33_mafia.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-10_b0ed58137bec6d75102b6976d306da33_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-10_b0ed58137bec6d75102b6976d306da33_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\9C6F.tmp"C:\Users\Admin\AppData\Local\Temp\9C6F.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-10_b0ed58137bec6d75102b6976d306da33_mafia.exe 5A461874D69B64435080779DE704C71D39DA15712687BD8BA8E10D27FF011A150CA206DC1A5FC0887AD52312037B50C9365E920537982905D1719C3A6EDC21B22⤵
- Deletes itself
- Executes dropped EXE
PID:1152
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD51f72ed5cfc984cc24dfdad4fbc329275
SHA12678815d9589d0270052530ed73a708656df18e0
SHA2569214b00038d686a9a11f43a3da182b1d4cdcb474e1bf523bc223853fbaeabf6e
SHA512664257216feb7d97753c46a1e107b6f3004859d4a9eb992003b7dabf7b61ea9c96624ff2bc2012497cbb769e0d3675fd26806bc5fe539640f68f853d026d6ab8