Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2024, 11:36
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-27_91dfef00bfe1f98089113fd026961d59_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-27_91dfef00bfe1f98089113fd026961d59_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-27_91dfef00bfe1f98089113fd026961d59_mafia.exe
-
Size
486KB
-
MD5
91dfef00bfe1f98089113fd026961d59
-
SHA1
7757d96612ba9a3693817ac01f3ebb3b7f94b0ad
-
SHA256
dcdf885e67dbe0f87be2384c3dd302ceb5f125878d09d77075d30a38b6886a23
-
SHA512
ae5c405d43a3f4cd1f4b5c5df47a7d53247f5eda5d400952eba8b2c9d447436a4a9ad267562f4636246f72a65dd69b2e6d905d33c425177b82e6f92a4da41c82
-
SSDEEP
12288:3O4rfItL8HPMIPSp1X/K+cGM4i0rGGG27rKxUYXhW:3O4rQtGPMKSp1XC+cGM4+GG23KxUYXhW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3784 607F.tmp -
Executes dropped EXE 1 IoCs
pid Process 3784 607F.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4920 wrote to memory of 3784 4920 2024-01-27_91dfef00bfe1f98089113fd026961d59_mafia.exe 87 PID 4920 wrote to memory of 3784 4920 2024-01-27_91dfef00bfe1f98089113fd026961d59_mafia.exe 87 PID 4920 wrote to memory of 3784 4920 2024-01-27_91dfef00bfe1f98089113fd026961d59_mafia.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-27_91dfef00bfe1f98089113fd026961d59_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-27_91dfef00bfe1f98089113fd026961d59_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\607F.tmp"C:\Users\Admin\AppData\Local\Temp\607F.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-27_91dfef00bfe1f98089113fd026961d59_mafia.exe 295AE1605F84F4D3B1F9AAEB17ADE7E0D3FB007DAB406525C5CE3405722D4AEA6D03CC96D54C698EC4CDE1DEE224CD42098FF525BFB2173402A7C1F0E6425DF62⤵
- Deletes itself
- Executes dropped EXE
PID:3784
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
486KB
MD5794316fc0df79566bc1991503fbcb910
SHA1b729744a9e1ec136d7e97595cca5978bc6ee9c2e
SHA256bf353dc2447800f9bad06bb549da20f4732d3d4ad63e8617753b270d7adbd976
SHA512f4bbceea84ecd22d708554d26310fe067d4ff0b173f1b173271a3e781e0c626fffb65a167c0e6bd1273adf4644fbbe978e1da71d4693d152eac862ae75f1aea4