Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
27/01/2024, 03:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-27_c268ab1fb5361282dcbad7034a7fa5d4_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-27_c268ab1fb5361282dcbad7034a7fa5d4_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-27_c268ab1fb5361282dcbad7034a7fa5d4_mafia.exe
-
Size
473KB
-
MD5
c268ab1fb5361282dcbad7034a7fa5d4
-
SHA1
d15ccbd8cd170c9b8e175aa2356d2593374db82c
-
SHA256
e11f36c330ebfce1918e9b1aa7810fb3a931083711a37a94575c53338eee0d25
-
SHA512
482610937f6dc53655a29daa72a2f556b5e8f79bac16c533f677ef125ac0725eb809b884f6671cf85f576ec0e6f8e6163f5c843bf9fb43c5b66bc7dd85cb998d
-
SSDEEP
12288:Nb4bZudi79L0DS9wDPSEc+3PU6qIN36A0a:Nb4bcdkL0uCD6+f/qIRR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2220 1130.tmp -
Executes dropped EXE 1 IoCs
pid Process 2220 1130.tmp -
Loads dropped DLL 1 IoCs
pid Process 628 2024-01-27_c268ab1fb5361282dcbad7034a7fa5d4_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 628 wrote to memory of 2220 628 2024-01-27_c268ab1fb5361282dcbad7034a7fa5d4_mafia.exe 28 PID 628 wrote to memory of 2220 628 2024-01-27_c268ab1fb5361282dcbad7034a7fa5d4_mafia.exe 28 PID 628 wrote to memory of 2220 628 2024-01-27_c268ab1fb5361282dcbad7034a7fa5d4_mafia.exe 28 PID 628 wrote to memory of 2220 628 2024-01-27_c268ab1fb5361282dcbad7034a7fa5d4_mafia.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-27_c268ab1fb5361282dcbad7034a7fa5d4_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-27_c268ab1fb5361282dcbad7034a7fa5d4_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\1130.tmp"C:\Users\Admin\AppData\Local\Temp\1130.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-27_c268ab1fb5361282dcbad7034a7fa5d4_mafia.exe 88A5B4EA8C3A2992E38A63DBD7C9A90D30083968CCC1D6334169ACBACE23599E6D7F7BAEB5E52987D215EC258A7E9A9E61B27DEE79E92D0868CEA7C4D5029EA02⤵
- Deletes itself
- Executes dropped EXE
PID:2220
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
473KB
MD5017a77ba1cc34a56427187d64dff574d
SHA11f81c9ed5397e18dc07a736a35201dc2ac01f78a
SHA256824180e6b840ec7bbe0701da45775874ae56b59d84abc0d739525b2aefcd2e26
SHA512092dcbca2c91eb211a0f36dc7e20181283298ceacd908bafca0bfcede37c76d396872e2ac2e48d79026cfb831abb79b45f222501adf570c8d2546a60ff6c8e2b