Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/02/2024, 10:16
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-12_d04e243d315c3d9898ac1b2cea3b3918_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-12_d04e243d315c3d9898ac1b2cea3b3918_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-12_d04e243d315c3d9898ac1b2cea3b3918_mafia.exe
-
Size
433KB
-
MD5
d04e243d315c3d9898ac1b2cea3b3918
-
SHA1
8a9b1399d35276a223d477dac1076116edbb19c5
-
SHA256
3804c36a988f3b1acd6cdba4d8ce826cbe7bac6ae0b4e7edca2f5abb7643ee76
-
SHA512
443df0c878f38b59deee7853c97303a9730bc92b1703fe8aa5e183c1924a73f51f9ab2ecedb2b3a85ec2e7f9b628ffd1bfe5e8f1e39b130e8417946dd6ae3c04
-
SSDEEP
12288:Ci4g+yU+0pAiv+n9AVYY6Y20hNHX5fLpn:Ci4gXn0pD+9A0rQpjx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1740 6087.tmp -
Executes dropped EXE 1 IoCs
pid Process 1740 6087.tmp -
Loads dropped DLL 1 IoCs
pid Process 2208 2024-02-12_d04e243d315c3d9898ac1b2cea3b3918_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 1740 2208 2024-02-12_d04e243d315c3d9898ac1b2cea3b3918_mafia.exe 28 PID 2208 wrote to memory of 1740 2208 2024-02-12_d04e243d315c3d9898ac1b2cea3b3918_mafia.exe 28 PID 2208 wrote to memory of 1740 2208 2024-02-12_d04e243d315c3d9898ac1b2cea3b3918_mafia.exe 28 PID 2208 wrote to memory of 1740 2208 2024-02-12_d04e243d315c3d9898ac1b2cea3b3918_mafia.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-12_d04e243d315c3d9898ac1b2cea3b3918_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-12_d04e243d315c3d9898ac1b2cea3b3918_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\6087.tmp"C:\Users\Admin\AppData\Local\Temp\6087.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-12_d04e243d315c3d9898ac1b2cea3b3918_mafia.exe 0B1405B70A05F35535DE6AC10158C665E689141C3C0C5729239AA023FAC2F810F832C94195CC24369D8B3B5904CE8B9ECF9F58C3BDAB562D5A9F2962A013589D2⤵
- Deletes itself
- Executes dropped EXE
PID:1740
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
433KB
MD5272f97619c5dfbf2f4a3105d75a54a3d
SHA15698583f67efd5b088fefb1f07b70701c113fdf3
SHA256573fa47d06e79e62c412af06cae330ea25fc65ddccd58db56756f1938a419378
SHA512adfd9547b90f22369ae060876f4c612fe0b697e9c85eaf31703275b06221010f13da1e13a28d92776f297fd4bb2d796d47a0607f85fd05846fd93ca2e121b2fe