Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/01/2024, 16:32 UTC
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-22_102448bd2503a7f4641f0ac88407a0ad_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-22_102448bd2503a7f4641f0ac88407a0ad_mafia.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-22_102448bd2503a7f4641f0ac88407a0ad_mafia.exe
-
Size
476KB
-
MD5
102448bd2503a7f4641f0ac88407a0ad
-
SHA1
59a52109f76478a20e098a0612f1103efd7b0819
-
SHA256
bb0f536cb8bb130e0fb4ecb780ca622f69881a73e356c095e1ae31a051f8bd85
-
SHA512
a3a85c58817c7a732afb52d08ede85e9fcb327fc78e3d1479ee5c5a2397bf7dcf0bd0237bd1b03a6e69b3697dcc723bd394a802f1234c35bf725ab7d87b2c09d
-
SSDEEP
12288:aO4rfItL8HRiCt3U4aErpWow7K9wlsDpVFd:aO4rQtGRze4M+9wlsDpVFd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2964 5689.tmp -
Executes dropped EXE 1 IoCs
pid Process 2964 5689.tmp -
Loads dropped DLL 1 IoCs
pid Process 2268 2024-01-22_102448bd2503a7f4641f0ac88407a0ad_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2964 2268 2024-01-22_102448bd2503a7f4641f0ac88407a0ad_mafia.exe 28 PID 2268 wrote to memory of 2964 2268 2024-01-22_102448bd2503a7f4641f0ac88407a0ad_mafia.exe 28 PID 2268 wrote to memory of 2964 2268 2024-01-22_102448bd2503a7f4641f0ac88407a0ad_mafia.exe 28 PID 2268 wrote to memory of 2964 2268 2024-01-22_102448bd2503a7f4641f0ac88407a0ad_mafia.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-22_102448bd2503a7f4641f0ac88407a0ad_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-22_102448bd2503a7f4641f0ac88407a0ad_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\5689.tmp"C:\Users\Admin\AppData\Local\Temp\5689.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-22_102448bd2503a7f4641f0ac88407a0ad_mafia.exe DBF98E585DE3DDF8A877824CF6B0C4F7B93233CC42DDEC86EB5D25D8D024AB7F1349A7D4EA01158908C377748B9A42E5CB6914B590B7B4B84B80F5B803ABE0C62⤵
- Deletes itself
- Executes dropped EXE
PID:2964
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
476KB
MD5116c3a5316e7a17979334af92d3c4d0d
SHA1ef52dbf9b6361e44f028c56b095343ec8c693fe7
SHA2568a5d06ba2aae6cf7540ad90eb148c5ae586016ec6de89d67e38d1bcaf1df4d63
SHA5126d4341fcff8e5958ef9ab9bb019556fe4c68c0f395ee527ea49440f4e466e180c9bee266e35b8fdd67c7bf8de639cb1d339662c7a6a9943e6442a5abb54e5def