Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/02/2024, 20:47
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-01_a05365c1e647c491bc718d690e7fdd9c_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-01_a05365c1e647c491bc718d690e7fdd9c_mafia.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-01_a05365c1e647c491bc718d690e7fdd9c_mafia.exe
-
Size
486KB
-
MD5
a05365c1e647c491bc718d690e7fdd9c
-
SHA1
06841d0fddd8bbbc3b8aa69859e1a50a1c618b2c
-
SHA256
9429931f7957f04454b5023e65aacba8c9f17b3d251bd1de8ee0ad0e41cbffcd
-
SHA512
835bda20dc114dd480f54ff558ba0a42bf5b99591da7a2cd16f9f31138a195ed2cc7469158f3fb19150034f5444fb800c20566cc69d8d60498078dd160b1f61e
-
SSDEEP
12288:3O4rfItL8HPkkB3zYW0/TCKh8ylCoAMLyr7rKxUYXhW:3O4rQtGPkkB3qTCKtlCodLyr3KxUYXhW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2516 3295.tmp -
Executes dropped EXE 1 IoCs
pid Process 2516 3295.tmp -
Loads dropped DLL 1 IoCs
pid Process 2016 2024-02-01_a05365c1e647c491bc718d690e7fdd9c_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2516 2016 2024-02-01_a05365c1e647c491bc718d690e7fdd9c_mafia.exe 28 PID 2016 wrote to memory of 2516 2016 2024-02-01_a05365c1e647c491bc718d690e7fdd9c_mafia.exe 28 PID 2016 wrote to memory of 2516 2016 2024-02-01_a05365c1e647c491bc718d690e7fdd9c_mafia.exe 28 PID 2016 wrote to memory of 2516 2016 2024-02-01_a05365c1e647c491bc718d690e7fdd9c_mafia.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-01_a05365c1e647c491bc718d690e7fdd9c_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-01_a05365c1e647c491bc718d690e7fdd9c_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\3295.tmp"C:\Users\Admin\AppData\Local\Temp\3295.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-01_a05365c1e647c491bc718d690e7fdd9c_mafia.exe C521480A263D5AAE5B834AE8552F8A227CC5CCF12E7E65BE67D8990A53286B8C561BF5C80C0BDA581573513748A94468343D69649C2CAD14006E6E3760342B792⤵
- Deletes itself
- Executes dropped EXE
PID:2516
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
486KB
MD5c50e5972ae48bf0486cb7925d64e6545
SHA190e5f4ea888ed831db5854048c9af8c78f9de24b
SHA2564a2e37000f6105a24a8673fe94306b7fcbd0a7d3d6b81f93ae171791c652e9e6
SHA512b501a175769b5bd16a624046453f199221245e67ca3349f4ecc38322e1cc923ca344b367b5d69ebe67d6c47f3f4c38f0d069a58ebd03d7c5e3c5b101f165970f