Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 08:00
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-12_bade5ddc9dcddfd81bd74f0135e1ff98_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-12_bade5ddc9dcddfd81bd74f0135e1ff98_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-12_bade5ddc9dcddfd81bd74f0135e1ff98_mafia.exe
-
Size
468KB
-
MD5
bade5ddc9dcddfd81bd74f0135e1ff98
-
SHA1
140c4989c96a2458ad4b9a428550c11b3287df00
-
SHA256
23a850967df1f679db17b0aa138aef7baca70582edc4eab1911443eb849a9537
-
SHA512
2464ba7ed236cee2b97bf8e685df533787a3c8d77d6fc0d5db69c038cbac34811fd6c3423865f702aa8d7388518c1c93b0f13e7739db20adf2a88b1aaf5cf717
-
SSDEEP
12288:qO4rfItL8HGd0P47Ayhu4jXcERBV6h3Z5QJGgIwod7bWmeEVGL:qO4rQtGGdljuksEYhp5QRIwodumeEVGL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3516 5719.tmp -
Executes dropped EXE 1 IoCs
pid Process 3516 5719.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3992 wrote to memory of 3516 3992 2024-02-12_bade5ddc9dcddfd81bd74f0135e1ff98_mafia.exe 85 PID 3992 wrote to memory of 3516 3992 2024-02-12_bade5ddc9dcddfd81bd74f0135e1ff98_mafia.exe 85 PID 3992 wrote to memory of 3516 3992 2024-02-12_bade5ddc9dcddfd81bd74f0135e1ff98_mafia.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-12_bade5ddc9dcddfd81bd74f0135e1ff98_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-12_bade5ddc9dcddfd81bd74f0135e1ff98_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\5719.tmp"C:\Users\Admin\AppData\Local\Temp\5719.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-12_bade5ddc9dcddfd81bd74f0135e1ff98_mafia.exe 252B50FCD2E6FAAC9C0A995BE95A7B00C5A306DA05D43AEC0F21DAD7FCB5F19776BF9804E43FB89369D29BF12EF9699F79DE7162B1B1A1420ADD878CAEE21CF72⤵
- Deletes itself
- Executes dropped EXE
PID:3516
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
468KB
MD5c8d5a5c854b369231efd842c0942af32
SHA17cb4d44ac811858c55efe976899067950f3616dd
SHA256a96ddbfe547aac053282b2664f49ef267eed84df4326a0143454c354216f8c78
SHA512d1451c48ada8d631c6e719478fec82f143bc2b03c92be6785853bef880bfffecb36a1258b356359e919ac56830f2e360bb0369556635cd4df9f0909d05fadf54