Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
88s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
02/02/2024, 10:41
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-02_1383791cde3316f664a1ab237afbdc2b_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-02_1383791cde3316f664a1ab237afbdc2b_mafia.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-02_1383791cde3316f664a1ab237afbdc2b_mafia.exe
-
Size
479KB
-
MD5
1383791cde3316f664a1ab237afbdc2b
-
SHA1
02274642d59d7710d71dd9712b9db7740b7079a1
-
SHA256
09c532b2c50bd7a21c822fe86ba41fdb530e55e09f897cc414a9faf03317f02a
-
SHA512
3d64db73870101a6e90b0b8e78369401d63186884b8c17e7f99b6cd2c582ceead1b95684156a6a46ac3502d8c1e021d5ec94516536dcde1d190de9550ed74884
-
SSDEEP
12288:bO4rfItL8HAYeuIz12yK/c+SJ852M5tbdQls1Y75UO:bO4rQtGA3uIziK85zZQKiVUO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4092 3FA9.tmp -
Executes dropped EXE 1 IoCs
pid Process 4092 3FA9.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4288 wrote to memory of 4092 4288 2024-02-02_1383791cde3316f664a1ab237afbdc2b_mafia.exe 86 PID 4288 wrote to memory of 4092 4288 2024-02-02_1383791cde3316f664a1ab237afbdc2b_mafia.exe 86 PID 4288 wrote to memory of 4092 4288 2024-02-02_1383791cde3316f664a1ab237afbdc2b_mafia.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-02_1383791cde3316f664a1ab237afbdc2b_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-02_1383791cde3316f664a1ab237afbdc2b_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\3FA9.tmp"C:\Users\Admin\AppData\Local\Temp\3FA9.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-02_1383791cde3316f664a1ab237afbdc2b_mafia.exe 85341DDF29A2335874BCFB0493D0C0D6ADEE4C7C321E9C5EF9E868E110E558D9B2F5D1233D4AA1174F6438987996F38B532CC38A2778B162C532494497AC5B8F2⤵
- Deletes itself
- Executes dropped EXE
PID:4092
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
479KB
MD5d686d1d5bb24d779ff843a60128bd22a
SHA107b0f816f2b438874cab899eee587b8449492b77
SHA256695252aeea0651a7fbb14d9020de02b10267312793e17a81393bc33acf809b6b
SHA512d3d10f5a2e1655ace0d865460c6a5bd8a256a577a7a0179c21b44c78ae78f524dba70895762a305fa3e1b09d05b6b42af1317a141030fac958429ff5d13a6a9f