Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 07:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-03_265a50de24c09c5c0085bd1355d8cd49_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-03_265a50de24c09c5c0085bd1355d8cd49_mafia.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-03_265a50de24c09c5c0085bd1355d8cd49_mafia.exe
-
Size
476KB
-
MD5
265a50de24c09c5c0085bd1355d8cd49
-
SHA1
5bd433f13144cdaa64d1fce072dbb1debf24773a
-
SHA256
386e4e33102822e89c6f3dd6244f33da000db89ef712c5c2eb0a44d39a262b7b
-
SHA512
be1e6b3cee9418bd98f88ec3eeee55028c77902280afe85f58e8cdc0a6e37c425a84d65a0ace9f81c9f4324e9f39341af7ff09a164f418c111a74ab2dab0217c
-
SSDEEP
12288:aO4rfItL8HREEZQbpk2WFXrJvDMoziOE6eog1uQ7K9wlsDpVFd:aO4rQtGR1Kba2WF75jGNj1v+9wlsDpVT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2344 5310.tmp -
Executes dropped EXE 1 IoCs
pid Process 2344 5310.tmp -
Loads dropped DLL 1 IoCs
pid Process 3040 2024-02-03_265a50de24c09c5c0085bd1355d8cd49_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2344 3040 2024-02-03_265a50de24c09c5c0085bd1355d8cd49_mafia.exe 28 PID 3040 wrote to memory of 2344 3040 2024-02-03_265a50de24c09c5c0085bd1355d8cd49_mafia.exe 28 PID 3040 wrote to memory of 2344 3040 2024-02-03_265a50de24c09c5c0085bd1355d8cd49_mafia.exe 28 PID 3040 wrote to memory of 2344 3040 2024-02-03_265a50de24c09c5c0085bd1355d8cd49_mafia.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-03_265a50de24c09c5c0085bd1355d8cd49_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-03_265a50de24c09c5c0085bd1355d8cd49_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\5310.tmp"C:\Users\Admin\AppData\Local\Temp\5310.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-03_265a50de24c09c5c0085bd1355d8cd49_mafia.exe 14F849FD1647EFAC23DB1870D47CBEBD503D3C53FF26B93B55A4771CE03C16C1187F02D00676026C0DA4515E263FCD3CAA2D39A810129C118424AC7C3FF2B8F02⤵
- Deletes itself
- Executes dropped EXE
PID:2344
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
476KB
MD52ca42d3a5f2c196e6a193daf3c29be99
SHA15bc96b0bc912bc603b3c1aa79dbaee4af3a56636
SHA256f1e5c5aa900e59898c9b1a6a48bb1fd93c72021823719be082d4af5ebb4667fa
SHA512a0d2b9002aa93bc22d1754d16b4b756a8b4c97337488148743cf0a8db9b6409993cdcec2a1b5f1eaf465e94fb4c7afc1af323e27d2995d991e38ce287dc9d598