Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20/02/2024, 03:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-20_a17351128ce4f1dc5873af4a2b6069b2_mafia.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-02-20_a17351128ce4f1dc5873af4a2b6069b2_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-20_a17351128ce4f1dc5873af4a2b6069b2_mafia.exe
-
Size
433KB
-
MD5
a17351128ce4f1dc5873af4a2b6069b2
-
SHA1
c5e54a305d6ec8f48f13db8b0a75430a36d47a8e
-
SHA256
50df92fd44d2e0c9fc4f1f8dd4b576378336b2c4d2ffa1a7789871e45612c662
-
SHA512
0c490226223f83282cfbb8af55994be9fb0a518b1189644c8ec94cfc73d31823a70760ba1fbd0b8731c8778c3cbb12e812a0f09da543b77611be0d6d75fa7bb3
-
SSDEEP
12288:Ci4g+yU+0pAiv+aqjM8isNAvQcy27H2E1lQn:Ci4gXn0pD+1esYnWEU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 608 544A.tmp -
Executes dropped EXE 1 IoCs
pid Process 608 544A.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3120 wrote to memory of 608 3120 2024-02-20_a17351128ce4f1dc5873af4a2b6069b2_mafia.exe 85 PID 3120 wrote to memory of 608 3120 2024-02-20_a17351128ce4f1dc5873af4a2b6069b2_mafia.exe 85 PID 3120 wrote to memory of 608 3120 2024-02-20_a17351128ce4f1dc5873af4a2b6069b2_mafia.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-20_a17351128ce4f1dc5873af4a2b6069b2_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-20_a17351128ce4f1dc5873af4a2b6069b2_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\544A.tmp"C:\Users\Admin\AppData\Local\Temp\544A.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-20_a17351128ce4f1dc5873af4a2b6069b2_mafia.exe 6EBA2353137F8DDA7EDAD2CEC66245FC8F08184FC077B28AFC2DE9B09F7EE4ED49D36B18F36B551D6C3910BB11C24866278BBC2914162A426B1D00BB0A6878872⤵
- Deletes itself
- Executes dropped EXE
PID:608
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
433KB
MD50d7a10626d1f1d223e16262452558406
SHA1f2af956e2cad2c1da743f5b7bed5d10509b44a05
SHA25690ca929130a3984d2ed8dd34430cfa267e92a935484fd1948afee22a95b92e1d
SHA5124ac8516b7bc76580d1daa8fb08000dce9d07ada7bdf8c2ece0cc254b69e85543211a6104213d1c4ee82d25a64cccda8fc6e4acda7b26c0afc05243a65e0f3aca