Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2024, 08:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-26_5d6757988a69991efec8b19240fbbd18_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-26_5d6757988a69991efec8b19240fbbd18_mafia.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-26_5d6757988a69991efec8b19240fbbd18_mafia.exe
-
Size
443KB
-
MD5
5d6757988a69991efec8b19240fbbd18
-
SHA1
535ac67f7256c29f3050145c232372b1ed8b0c2a
-
SHA256
9c907b2ae3d5ed711452d94be7843974b0a011bfcbd80f2ebe666379bf3f3638
-
SHA512
e0533d54bd0284612041fb90b79557002dd04f604d7bf23b8c12961a41d8cb16e0d2b992c4f0f60f712e25986a4bcf3cbfbbddf3ef688f7c0dfe124c45b61165
-
SSDEEP
12288:Wq4w/ekieZgU6K9+dddB8d5bDGHiTdlRFGgxElMa:Wq4w/ekieH6K9u8jbqCJlGgaP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3448 445C.tmp -
Executes dropped EXE 1 IoCs
pid Process 3448 445C.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1624 wrote to memory of 3448 1624 2024-01-26_5d6757988a69991efec8b19240fbbd18_mafia.exe 84 PID 1624 wrote to memory of 3448 1624 2024-01-26_5d6757988a69991efec8b19240fbbd18_mafia.exe 84 PID 1624 wrote to memory of 3448 1624 2024-01-26_5d6757988a69991efec8b19240fbbd18_mafia.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_5d6757988a69991efec8b19240fbbd18_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-26_5d6757988a69991efec8b19240fbbd18_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\445C.tmp"C:\Users\Admin\AppData\Local\Temp\445C.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-26_5d6757988a69991efec8b19240fbbd18_mafia.exe C6AD63A26497EE556AA2D697DFB9D1C7EA621E445A17AA29D82F5475BD40F2F5C551094A62DBE4900C534F867F12DA6F6008C5B805187CBB21733960F88408BF2⤵
- Deletes itself
- Executes dropped EXE
PID:3448
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
443KB
MD51ece2ea1e18f71059701cc1ecdc7b53f
SHA19c8a7cdef339c42a061382d4a3803220b8759a74
SHA2569bd5dd80836bca2e6aa9734942a91d7cf22f573a9777df7b1efcd96b75bc65f3
SHA512188c26771344779ebc96bd7ce3dba87f862757485d17818b6b091bbe3ed53f1813e48f5fa6348a517b6fc714e2addf64b6c0c5da8c0f59b99a6c6d30a72a8bc2