Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 11:55
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-14_67309052a5aea270f32224e718e4aa1a_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-14_67309052a5aea270f32224e718e4aa1a_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-14_67309052a5aea270f32224e718e4aa1a_mafia.exe
-
Size
433KB
-
MD5
67309052a5aea270f32224e718e4aa1a
-
SHA1
c853265ca8708bb0b77458e9a05bd975a72bf715
-
SHA256
1710b144cd08e7f3cf04378422c4b71841bf803b0bc19ba55bc6871cf193aa35
-
SHA512
4c692836a1e833234a66672195d567ddb1f02514091303ff2fe8d93bfe73ad9c3d42625f40e7505a8491dcedf0cbeec2714e1ebf213a6bf81dfe47372e5f3f5f
-
SSDEEP
12288:Ci4g+yU+0pAiv+YFzc4dZxLu2Kl6/eoDn:Ci4gXn0pD+Dq7LKm
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2344 8FDC.tmp -
Executes dropped EXE 1 IoCs
pid Process 2344 8FDC.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1420 wrote to memory of 2344 1420 2024-02-14_67309052a5aea270f32224e718e4aa1a_mafia.exe 83 PID 1420 wrote to memory of 2344 1420 2024-02-14_67309052a5aea270f32224e718e4aa1a_mafia.exe 83 PID 1420 wrote to memory of 2344 1420 2024-02-14_67309052a5aea270f32224e718e4aa1a_mafia.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-14_67309052a5aea270f32224e718e4aa1a_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-14_67309052a5aea270f32224e718e4aa1a_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\8FDC.tmp"C:\Users\Admin\AppData\Local\Temp\8FDC.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-14_67309052a5aea270f32224e718e4aa1a_mafia.exe B4C68F741817F0F0EAAE44EAEB3B6F74F45D2BDFA348C5885255218B6C42AF143BBD26AAF62AF47F8E2D7C61E8A097765A0F0D76BAFCDDD321C366D85EDB6C922⤵
- Deletes itself
- Executes dropped EXE
PID:2344
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
433KB
MD55bb23d0bee3d9311e65e78d4bf68815e
SHA16997f2fa2a2f23c9bea30189fea008c2eeb806bb
SHA2561d40114000613c739f2c792a2476187f823271ed41ea3e4e444cb65387d383e5
SHA512ab2ed05217b204a08d2c70338aa46e97244af7018eeda0ee157629dd3ce994f91b1960eae1b5c5be5688feb6dd9155deda60600dc75379c990b936d273fdc223