Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02/02/2024, 12:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-02_281bed897f670847e8e5799c6b5d5c74_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-02_281bed897f670847e8e5799c6b5d5c74_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-02_281bed897f670847e8e5799c6b5d5c74_mafia.exe
-
Size
468KB
-
MD5
281bed897f670847e8e5799c6b5d5c74
-
SHA1
a72e0865aeb6154b0fb759c62dcc409d090beeca
-
SHA256
29c7367f30855049c7ce38990d36845f33676f7d0296e83eb07be44019a3896a
-
SHA512
b86ea8f129b2554a41b2fcadec1713b3f826946e088f189795a997da01a6f20d4a08ba8ef39c6fc7738b87e75bbc8970f1078c5a22800dc43b4dc12c84994660
-
SSDEEP
12288:qO4rfItL8HGCHlWlrzhcWgK6qQC+bMgoZxBzUF7bWmeEVGL:qO4rQtGGCFE2WTGMgohUFumeEVGL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3624 FCEE.tmp -
Executes dropped EXE 1 IoCs
pid Process 3624 FCEE.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 404 wrote to memory of 3624 404 2024-02-02_281bed897f670847e8e5799c6b5d5c74_mafia.exe 83 PID 404 wrote to memory of 3624 404 2024-02-02_281bed897f670847e8e5799c6b5d5c74_mafia.exe 83 PID 404 wrote to memory of 3624 404 2024-02-02_281bed897f670847e8e5799c6b5d5c74_mafia.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-02_281bed897f670847e8e5799c6b5d5c74_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-02_281bed897f670847e8e5799c6b5d5c74_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\AppData\Local\Temp\FCEE.tmp"C:\Users\Admin\AppData\Local\Temp\FCEE.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-02_281bed897f670847e8e5799c6b5d5c74_mafia.exe D680E38A7034BB52E75F3BBC1794E7C155EA9B5CD06F3173D714D0F58DE3E41D1FE9DEB79B45E724ADC8863053E7BF2663AB3F59B91837DE7C87C75F84B32FDB2⤵
- Deletes itself
- Executes dropped EXE
PID:3624
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
468KB
MD56934f1df403d1510c1d990167615814d
SHA1e39f54a719a7c40c47999d84c3e990ed5d005db6
SHA2563ab9eb35115767d8b87a3a2f4d989e1fafdd7d530494f07c09a136108343742c
SHA51268ceb59c141905627ff58151c6cead691bf18b24e139fe6085db0528734dd4af15c0d676f8af37eecc2cbb5ca6151e6d1307d38fa873e6ca1dbcf28f7b1d2be7