Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 06:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-04_eefdc257fc0a9cda68743944f4d05dd7_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-04_eefdc257fc0a9cda68743944f4d05dd7_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-04_eefdc257fc0a9cda68743944f4d05dd7_mafia.exe
-
Size
412KB
-
MD5
eefdc257fc0a9cda68743944f4d05dd7
-
SHA1
d8a51f074003c740db1a86f59ab5da510c8d550f
-
SHA256
0f5598b54489e24d6e60f230375618b6c444fa1e56723beeecb7371d73040e3a
-
SHA512
5f93e1334e9112f3276a8b3ace59f628a9237f5d89ca3c8c21d6e80c64f94708c77567d1afaa187821b1584eb72433521edf4e29ed3cac140e558458e86f0d34
-
SSDEEP
6144:UooTAQjKG3wDGAeIc9kphIoDZn/+8t/sQBPc7giXFjO0wC6PO19YqZox6P:U6PCrIc9kph5VsQhc7fX9O02O1aQoxi
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2176 4930.tmp -
Executes dropped EXE 1 IoCs
pid Process 2176 4930.tmp -
Loads dropped DLL 1 IoCs
pid Process 1308 2024-02-04_eefdc257fc0a9cda68743944f4d05dd7_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1308 wrote to memory of 2176 1308 2024-02-04_eefdc257fc0a9cda68743944f4d05dd7_mafia.exe 28 PID 1308 wrote to memory of 2176 1308 2024-02-04_eefdc257fc0a9cda68743944f4d05dd7_mafia.exe 28 PID 1308 wrote to memory of 2176 1308 2024-02-04_eefdc257fc0a9cda68743944f4d05dd7_mafia.exe 28 PID 1308 wrote to memory of 2176 1308 2024-02-04_eefdc257fc0a9cda68743944f4d05dd7_mafia.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-04_eefdc257fc0a9cda68743944f4d05dd7_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-04_eefdc257fc0a9cda68743944f4d05dd7_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\4930.tmp"C:\Users\Admin\AppData\Local\Temp\4930.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-02-04_eefdc257fc0a9cda68743944f4d05dd7_mafia.exe DE63E5512C2088B19F504CDD6449F32EFB0BFA31A3B1AD7A67223071711E9B85E73B534B5DA3CD2DD0668540A0A563FC9638F491F414D61ED245672AAC24E2792⤵
- Deletes itself
- Executes dropped EXE
PID:2176
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD5a672e65ec1a7de4dd8e2e249c908a7e9
SHA17e8d86fb7d58be8020d65aca2d02da5eb81ffabb
SHA256901ad02ba36b55858348a0891af35195d15357371e8bd78fbda31761f6497496
SHA5125bc73aa481e15d16c5b8280666b0448793bb5bf5ea816353688d4303566765ea37f757c0f12dabec2de91be88ab2950a778b4120059c9fe02245adf70b6b6fb6