Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
81s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 06:01
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-11_7e497707a865c0d8ece9f183f5ffcf6e_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-11_7e497707a865c0d8ece9f183f5ffcf6e_mafia.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-11_7e497707a865c0d8ece9f183f5ffcf6e_mafia.exe
-
Size
411KB
-
MD5
7e497707a865c0d8ece9f183f5ffcf6e
-
SHA1
f98dd71de8b7f28012d74efc17f7c1e261c945da
-
SHA256
de825f3aed3cec10189b9819271a0695541721c4e83dd98f66d7af538f7c1a4f
-
SHA512
8b889c7e708ffd32a58bcbff9d6082fb313b5fda220a2f4bac85d62d2c3cbf5e634395661cee6e60b609d71f99801ca0fd69dc6644a28f37d8939f649e2c427c
-
SSDEEP
6144:gVdvczEb7GUOpYWhNVynE/mFMUkdIVKcwoqOv3WIADMqHI:gZLolhNVyE1Uk+HZ3WJ4qHI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5248 562E.tmp -
Executes dropped EXE 1 IoCs
pid Process 5248 562E.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5636 wrote to memory of 5248 5636 2024-01-11_7e497707a865c0d8ece9f183f5ffcf6e_mafia.exe 17 PID 5636 wrote to memory of 5248 5636 2024-01-11_7e497707a865c0d8ece9f183f5ffcf6e_mafia.exe 17 PID 5636 wrote to memory of 5248 5636 2024-01-11_7e497707a865c0d8ece9f183f5ffcf6e_mafia.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-11_7e497707a865c0d8ece9f183f5ffcf6e_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-11_7e497707a865c0d8ece9f183f5ffcf6e_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5636 -
C:\Users\Admin\AppData\Local\Temp\562E.tmp"C:\Users\Admin\AppData\Local\Temp\562E.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-01-11_7e497707a865c0d8ece9f183f5ffcf6e_mafia.exe 6FC39D87C02CBFB2D57DB16BB569B28E717F729274D67F696E463DBA2B468169EC94A928D74D5F8C5BD4902A4EE3BE9ACB6A71953ED597B660720BD0FBC50ED22⤵
- Deletes itself
- Executes dropped EXE
PID:5248
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD52fb5d10d87b9a6d20b3a8bbe5734ddfb
SHA1812be4dc018acda03a73a54d6bc4e7af4f4fa6dd
SHA25667ae0444e184a8f9d694098a4a880ba8b50487d00844f53931187fd96b5056e8
SHA5121da0346458d927d93e9c220642593087fbcec9684680be70236ba74523481e5aaae49d48e271c023d13d32d3cc726f200da2cfe151ee255d61f75d332c04a430