Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
90s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2024, 14:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-27_c98e24a84a897a6a1ba0cec5078cee45_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-27_c98e24a84a897a6a1ba0cec5078cee45_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-27_c98e24a84a897a6a1ba0cec5078cee45_mafia.exe
-
Size
428KB
-
MD5
c98e24a84a897a6a1ba0cec5078cee45
-
SHA1
a56283ef7a2632bb6713c4c10d052058b9cc5c2b
-
SHA256
fdf1ca5a35ea2d55d1ad3cfd73f0a33dd1c26e1c0c5e9ef5f71187cf07e30079
-
SHA512
fa2b5028066c81049bec84078ac18a55df5f233d01206513f52930a7ae790594c7e2f1f666fe0e3f80a7e43cc48c511254a40be11650ffc7c2c7f067479a6cf0
-
SSDEEP
12288:Z594+AcL4tBekiuKzErorooIAREbt/bMSIRbKqEygXp7eMXil:BL4tBekiuVrE1IlYpKqEygXpSIi
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 116 46BD.tmp -
Executes dropped EXE 1 IoCs
pid Process 116 46BD.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 448 wrote to memory of 116 448 2024-01-27_c98e24a84a897a6a1ba0cec5078cee45_mafia.exe 86 PID 448 wrote to memory of 116 448 2024-01-27_c98e24a84a897a6a1ba0cec5078cee45_mafia.exe 86 PID 448 wrote to memory of 116 448 2024-01-27_c98e24a84a897a6a1ba0cec5078cee45_mafia.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-27_c98e24a84a897a6a1ba0cec5078cee45_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-27_c98e24a84a897a6a1ba0cec5078cee45_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Users\Admin\AppData\Local\Temp\46BD.tmp"C:\Users\Admin\AppData\Local\Temp\46BD.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-27_c98e24a84a897a6a1ba0cec5078cee45_mafia.exe EB291A348191EDDB90E07EF86195C024287F114F09FE23DC28F5CC391CB0874A0B8E2674062F3B2BB71F74FA8C9B1B98A47DD46DD8AFF7D147B81E0CA0FE926D2⤵
- Deletes itself
- Executes dropped EXE
PID:116
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
428KB
MD5adeea2e011037847acac3088355b19e5
SHA1172936fabed957d2f17dbd5bc7dec0c23832a2b8
SHA256a5c31d52c7b6362440ca3c470e00291569af98c791bce17adfb3ecb41a058005
SHA512b2c8e586445f67bc141dd2f3746daea6b889ab112acb85c175c4a600d5028847be093571e6cb72504a5677a28a3ab0e56c4f99cd16ad2efe324d4909bf2039bb