Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 10:28
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-04_5bcfb7d16e8249803345501f8018e6d2_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-04_5bcfb7d16e8249803345501f8018e6d2_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-04_5bcfb7d16e8249803345501f8018e6d2_mafia.exe
-
Size
411KB
-
MD5
5bcfb7d16e8249803345501f8018e6d2
-
SHA1
37ba294e0f58878367c34dc175548ea43fe89305
-
SHA256
1cc7a583973ac2293c9ba2eabe8fb117afbb38d5490c3a100f8261442c24b34d
-
SHA512
2db1bc31610cf56ebffacbc7962cd374b53733eac57bd96b05457f1d2a6ef7ba4b2976d0a96c089492d4f25e609191f7a4289d3cef932a90679840086354d453
-
SSDEEP
6144:gVdvczEb7GUOpYWhNVynE/mFZ05UXUCC2JuwBka7K1nTTZv1bYV6x10YqHI:gZLolhNVyEwkUXUCCHgiZTZv1bqHI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2084 A093.tmp -
Executes dropped EXE 1 IoCs
pid Process 2084 A093.tmp -
Loads dropped DLL 1 IoCs
pid Process 2212 2024-02-04_5bcfb7d16e8249803345501f8018e6d2_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2084 2212 2024-02-04_5bcfb7d16e8249803345501f8018e6d2_mafia.exe 28 PID 2212 wrote to memory of 2084 2212 2024-02-04_5bcfb7d16e8249803345501f8018e6d2_mafia.exe 28 PID 2212 wrote to memory of 2084 2212 2024-02-04_5bcfb7d16e8249803345501f8018e6d2_mafia.exe 28 PID 2212 wrote to memory of 2084 2212 2024-02-04_5bcfb7d16e8249803345501f8018e6d2_mafia.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-04_5bcfb7d16e8249803345501f8018e6d2_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-04_5bcfb7d16e8249803345501f8018e6d2_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\A093.tmp"C:\Users\Admin\AppData\Local\Temp\A093.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-02-04_5bcfb7d16e8249803345501f8018e6d2_mafia.exe 971B511B6FEB2B66BC6616CA8626FEF3384ACE71D33019F7C76DA7FF646BEBDF1EBCE5B4EC8F2A152D3087405B6512F1898F6A86FC9A66DC63BED7817F69571B2⤵
- Deletes itself
- Executes dropped EXE
PID:2084
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
411KB
MD5089c96b96e6dc90ebf3d0487e3045570
SHA1fc2186bb721b1a5bba941e0aa26013851f0e784d
SHA2566a0593d9b301cb7acc982e20fc45dd45baf578d4eb729c0e1e6e41a0821c106e
SHA512d43cefdc7322a63b6a66254102c99a24eec8ef3d933f1fd5606ecce6ca2a6643143e9e4d2fc1e9f85f0235b43739d4daef8b77036014eb8050ef517e9eb3ccc7