Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
28/01/2024, 01:33
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-28_685f355f89dcb8eb902e6c9c23813c0b_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-28_685f355f89dcb8eb902e6c9c23813c0b_mafia.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-28_685f355f89dcb8eb902e6c9c23813c0b_mafia.exe
-
Size
433KB
-
MD5
685f355f89dcb8eb902e6c9c23813c0b
-
SHA1
42f4e9b8eee4190ee48ca05b36fcb06ea01cfb41
-
SHA256
f912b1c96c806f3e71cee756e0b75cce931cc68ad02f713acad488fabea90d4e
-
SHA512
536f583ebd35df4bc5d12943068d23a7a908b4c2caa105b1f9179f0909fcc6d7716dea7e195919e79f034e42492e6d5d3db29c07a57f5f2830010325e1df686a
-
SSDEEP
12288:Ci4g+yU+0pAiv+I07FvUV/moIH+W85qn8gC5n:Ci4gXn0pD+H+V1CvYgCh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2800 4B41.tmp -
Executes dropped EXE 1 IoCs
pid Process 2800 4B41.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5012 wrote to memory of 2800 5012 2024-01-28_685f355f89dcb8eb902e6c9c23813c0b_mafia.exe 86 PID 5012 wrote to memory of 2800 5012 2024-01-28_685f355f89dcb8eb902e6c9c23813c0b_mafia.exe 86 PID 5012 wrote to memory of 2800 5012 2024-01-28_685f355f89dcb8eb902e6c9c23813c0b_mafia.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-28_685f355f89dcb8eb902e6c9c23813c0b_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-28_685f355f89dcb8eb902e6c9c23813c0b_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\4B41.tmp"C:\Users\Admin\AppData\Local\Temp\4B41.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-28_685f355f89dcb8eb902e6c9c23813c0b_mafia.exe 175FDED972326438389A2C54F078AE99B39B8F4DDE6AF667D294254A1A0315D5313BA6FE6FD7FB13EFD021D2FBAFECD0931B8B31609856A7C6AE67955AFD87002⤵
- Deletes itself
- Executes dropped EXE
PID:2800
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
433KB
MD5436a96a0068d926a7cb273173fa291f5
SHA160b7028247f846e21c6217f4b9eec8aa45a8319b
SHA256cbb8cbe485cdce80e177819e6735fa2795693a34996c61634c62522ba747d05c
SHA5127dbd2e5bb27e955291f0b6310e805bc01f29a786cb53eb1d76a804a53c3c01fad0cb7de729575df38e5a943fc81918556487c9ea43311dc3dab2ec0f65868d31