Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 22:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-18_4dde9ec06ca2a7809651254ad06986f5_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-18_4dde9ec06ca2a7809651254ad06986f5_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-18_4dde9ec06ca2a7809651254ad06986f5_mafia.exe
-
Size
479KB
-
MD5
4dde9ec06ca2a7809651254ad06986f5
-
SHA1
456c0cc13cf14032864f0bbf3f18137be043f3de
-
SHA256
3a52c9230a8cd37ee62200d96bd38b521167f40b224000556c2108922c52e92f
-
SHA512
4b13e28fb3eedec9ca39f1ca1caaca51dceaef77e8b6f4c18a59f0a4ed2dc658e94839649d680bc6bf1d934c60f2a7b0c611ce53fb139df3fa94128ace132cb2
-
SSDEEP
12288:bO4rfItL8HAd23EkveoQIOkFHDhQkFzoM75UO:bO4rQtGAY31voIHjJVUO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3896 5832.tmp -
Executes dropped EXE 1 IoCs
pid Process 3896 5832.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5064 wrote to memory of 3896 5064 2024-01-18_4dde9ec06ca2a7809651254ad06986f5_mafia.exe 33 PID 5064 wrote to memory of 3896 5064 2024-01-18_4dde9ec06ca2a7809651254ad06986f5_mafia.exe 33 PID 5064 wrote to memory of 3896 5064 2024-01-18_4dde9ec06ca2a7809651254ad06986f5_mafia.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-18_4dde9ec06ca2a7809651254ad06986f5_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-18_4dde9ec06ca2a7809651254ad06986f5_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\5832.tmp"C:\Users\Admin\AppData\Local\Temp\5832.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-18_4dde9ec06ca2a7809651254ad06986f5_mafia.exe D4778FD54A83CDF0BFAF49A2ED3217BBB73EEA8F2DE9714BE6A034CFB3175493D3C27B736DE8ED9F77B4D0C4F97E190CE8B33906D7855B20BF610C8C878EC27B2⤵
- Deletes itself
- Executes dropped EXE
PID:3896
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
479KB
MD57b0f8f5af3ed71315f4eb35b5e45823c
SHA10f8357acd33c9fbab78a002322cab145394efb54
SHA256078d8be25c15c18b7d7a23945234dee737a0fcdd9c128a2510121b36f44f3e1d
SHA512bc2879bd879134229c632e0b24a0c098bf4d509e1f78b8bae4d2b6f76ee2e09bb11daae869f63939a2b267f3092f9b41421a3c5fa7aeed5452dcdee677252f0f