Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
173s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 05:56
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-11_29519eddc78ebc01a4e995cc3fc7440b_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-11_29519eddc78ebc01a4e995cc3fc7440b_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-11_29519eddc78ebc01a4e995cc3fc7440b_mafia.exe
-
Size
412KB
-
MD5
29519eddc78ebc01a4e995cc3fc7440b
-
SHA1
748cc1cc068119d0d1302f789ca6b3b89a203a3b
-
SHA256
a020f21dbfb168cb589d0ce2c83caee59401a1354aac09fa4db5f56dc57742d3
-
SHA512
ae9e66127e9a71379d61c16011fbdb8902632ef9029a4f218e6b38b873f69bf34a08200404e8c70b967cca1e6c01b622370f33009a40464e64ca9ff430f3d27c
-
SSDEEP
12288:U6PCrIc9kph5YT769gbiuMqjhFEIViJJW:U6QIcOh5875vjtFLiJ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3976 DD02.tmp -
Executes dropped EXE 1 IoCs
pid Process 3976 DD02.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2120 wrote to memory of 3976 2120 2024-01-11_29519eddc78ebc01a4e995cc3fc7440b_mafia.exe 88 PID 2120 wrote to memory of 3976 2120 2024-01-11_29519eddc78ebc01a4e995cc3fc7440b_mafia.exe 88 PID 2120 wrote to memory of 3976 2120 2024-01-11_29519eddc78ebc01a4e995cc3fc7440b_mafia.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-11_29519eddc78ebc01a4e995cc3fc7440b_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-11_29519eddc78ebc01a4e995cc3fc7440b_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\DD02.tmp"C:\Users\Admin\AppData\Local\Temp\DD02.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-01-11_29519eddc78ebc01a4e995cc3fc7440b_mafia.exe EB9226A43E178CA927CEE799FFB0C8CB19E97CB408E1FE687338971950878686E808FE372BDF3F34DAA94E38AF69811E3AC9977439FCF5AC469028FDE82F1EAC2⤵
- Deletes itself
- Executes dropped EXE
PID:3976
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229KB
MD514eee34d9a967b9d0efd9493f3d7a18a
SHA18d49ae42248b8c446d1ca8a1be3e8626f7eda37d
SHA2565dd2d9b93ea39492601beaf8da2f6d1561899fe1575cefd1a7e7bb233f11132c
SHA51201841472694b806fb1344c09531836a5c59a3113e72c21387e26d1e6a3220f92b7c3278c62a95c2b96dfba9bec5f21ea3e191f58f031a7e6831636d01101a25f
-
Filesize
186KB
MD50eb1a9e63ae5dc671755bd3e14a816ac
SHA107fbe193897c5d67d5cffa04fd44617b512ba11c
SHA25628a77894f11cf06c60b81bbac24dc9c284eccf45cdbf968ca3bfbb97e9361207
SHA512d7b87dbca142078031d24a3917be96c957f423af7d93ad5f8e50260aca2c2aca8442101a636e8db1b3237794324c4381c11e80f5cb0495c56d22a743b815e0a4