Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/02/2024, 21:48
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-11_d332554c641a77dd70562f87ea9675f8_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-11_d332554c641a77dd70562f87ea9675f8_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-11_d332554c641a77dd70562f87ea9675f8_mafia.exe
-
Size
384KB
-
MD5
d332554c641a77dd70562f87ea9675f8
-
SHA1
bfb077f355ab2fc1c6fb322970e109bcc63edfe1
-
SHA256
e6deb06b9b5e6494412c55c2b430c8921aa056960d262df1577d5f381ca83c8f
-
SHA512
aa5bcd46fa1d88dae84a264dcde359f7e99f6b99c3ed7c751b801778b116ddc398b86a9c45932791e04963dd60910a863e7bd3b85741ef5a043d8cf051326a70
-
SSDEEP
6144:drxfv4co9ZL3GBGgjODxbf7hHGbGQDvE1ZuGg9LSVQoJfCmf2F2LjbNW27Z:Zm48gODxbzoDwEG5eoJfCmA2PbLZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2560 39C6.tmp -
Executes dropped EXE 1 IoCs
pid Process 2560 39C6.tmp -
Loads dropped DLL 1 IoCs
pid Process 1724 2024-02-11_d332554c641a77dd70562f87ea9675f8_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2560 1724 2024-02-11_d332554c641a77dd70562f87ea9675f8_mafia.exe 28 PID 1724 wrote to memory of 2560 1724 2024-02-11_d332554c641a77dd70562f87ea9675f8_mafia.exe 28 PID 1724 wrote to memory of 2560 1724 2024-02-11_d332554c641a77dd70562f87ea9675f8_mafia.exe 28 PID 1724 wrote to memory of 2560 1724 2024-02-11_d332554c641a77dd70562f87ea9675f8_mafia.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-11_d332554c641a77dd70562f87ea9675f8_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-11_d332554c641a77dd70562f87ea9675f8_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\39C6.tmp"C:\Users\Admin\AppData\Local\Temp\39C6.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-02-11_d332554c641a77dd70562f87ea9675f8_mafia.exe 3D0008048CC10DBD29FA3C91CDC4F059D939F6CE85DD040AB514C71E9C787E9D79CCBB1FA47EAD97A105324D7C7B0D8C2B11E8EE24B125F3F9007E0D50FF63062⤵
- Deletes itself
- Executes dropped EXE
PID:2560
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD5f4287edd05806c0954744157ec1d81d2
SHA10f0b2b6764765b942617bd30c32ae3df971fe6c4
SHA256aad0492ee724cc0e548bb448ff10b4f9d1299cd482b1f25f8ab5ffe7b85150c6
SHA5129afd93729a7503ed86228af41eb9fd4c1e99d22069497d8271e863a19e3724dd7e30a8cefd29d257d7f5db084effd2abbcb1ed49ac4511088157f0e6b664fa1e