Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
17/02/2024, 22:49
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-17_82d076978594f39258cd1a56390f9e8a_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-17_82d076978594f39258cd1a56390f9e8a_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-17_82d076978594f39258cd1a56390f9e8a_mafia.exe
-
Size
428KB
-
MD5
82d076978594f39258cd1a56390f9e8a
-
SHA1
6a03970b7eae01672955beb333e2043f08c03dea
-
SHA256
7f88de43b0d8b73adb321c85d63cfb61243f5e5057bd8ec71c8ececd4fb4b438
-
SHA512
7644534f71601d3e3588433432a158cb6b13fa04ead7b046842419fb47ea1f81939897715a1e50b1db3974efe9dc6588000eeefd5cefb66171b371e71ae13417
-
SSDEEP
12288:gZLolhNVyE9dOM1QNo1Rlfr7A5VPL/E/n5UNqHR:gZqhOEe8QC1RlfnA5Z/KOU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2376 C3BD.tmp -
Executes dropped EXE 1 IoCs
pid Process 2376 C3BD.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1032 wrote to memory of 2376 1032 2024-02-17_82d076978594f39258cd1a56390f9e8a_mafia.exe 84 PID 1032 wrote to memory of 2376 1032 2024-02-17_82d076978594f39258cd1a56390f9e8a_mafia.exe 84 PID 1032 wrote to memory of 2376 1032 2024-02-17_82d076978594f39258cd1a56390f9e8a_mafia.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-17_82d076978594f39258cd1a56390f9e8a_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-17_82d076978594f39258cd1a56390f9e8a_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\C3BD.tmp"C:\Users\Admin\AppData\Local\Temp\C3BD.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-02-17_82d076978594f39258cd1a56390f9e8a_mafia.exe 6D98E2DE99B7AB3C8F951859FEBBF2614DD9F2D791F853487ADC32D2278A5062066D545654BD7150B9879A702495EFF7AAB9920B39C343BE1D6A33E5A045ECD82⤵
- Deletes itself
- Executes dropped EXE
PID:2376
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
249KB
MD56d8cdd7393449f85f606f2fd40618230
SHA1de122e87e7d5332684acdb02168ac3491b04bedf
SHA2569099b741e32b7274a414188fe2bb0987f114c48c6e99ba75722a1b26c5e714f0
SHA512e2d617773ea1460347f29d7a341ea72b65251e46297688fbdb03caf585f03eda3ab099afed5eb483466987ebca1f24eb00154bae0bd10a652b0a7babc91d8c85
-
Filesize
428KB
MD59ce428facd29477d43cb8701ea3251d1
SHA1d033dc28ce96d8882137de32a40323c283828c87
SHA256d63b48be1ece9a096083915c720c79cfa5c7e42af4cb68464e36bd609be249b2
SHA51217bf46ce144c4809f895fc6f3a4cd860e24161173204be989b412b1a68793028361417c2f56bb07798d9fbff0d1f8c284bdb9bae12c9158a95cea8e651c56dca