Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20/02/2024, 06:05
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-20_b8905d024033e22df9be4d39382e2faf_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-20_b8905d024033e22df9be4d39382e2faf_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-20_b8905d024033e22df9be4d39382e2faf_mafia.exe
-
Size
479KB
-
MD5
b8905d024033e22df9be4d39382e2faf
-
SHA1
baab4f1de99da6d2010f3dd4cf7cfcabe0cbb9de
-
SHA256
01b546f827d782c6d14d755f73dc0934a19e717cce04404cd278cffe34797cf2
-
SHA512
b224db39377e6e2072d94df5aba8879220cff29d4fb35af2dad90d6c10de6267d82caec229069cea2ef9a8082f76129297b3527061879f19d1ca7acc489e77f0
-
SSDEEP
12288:bO4rfItL8HAxVIANIMZ2PVsUXlgvoJ3pFq75UO:bO4rQtGAxx8PVsUKykVUO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3824 789B.tmp -
Executes dropped EXE 1 IoCs
pid Process 3824 789B.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 980 wrote to memory of 3824 980 2024-02-20_b8905d024033e22df9be4d39382e2faf_mafia.exe 84 PID 980 wrote to memory of 3824 980 2024-02-20_b8905d024033e22df9be4d39382e2faf_mafia.exe 84 PID 980 wrote to memory of 3824 980 2024-02-20_b8905d024033e22df9be4d39382e2faf_mafia.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-20_b8905d024033e22df9be4d39382e2faf_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-20_b8905d024033e22df9be4d39382e2faf_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Users\Admin\AppData\Local\Temp\789B.tmp"C:\Users\Admin\AppData\Local\Temp\789B.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-20_b8905d024033e22df9be4d39382e2faf_mafia.exe 32FF5F49F9BA2C7F30304AACE5E35AA907FEE76D9AC9B9CADFE037202F1E917C0CD6C78FF21A059673EE690BC6E259ED9A19BCF4800C5111B88538168D7CF07A2⤵
- Deletes itself
- Executes dropped EXE
PID:3824
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
479KB
MD5d3b1d8933f8088e63180bb00aafc3999
SHA10535979bf9c45222f661aac19b79f64193470a4d
SHA256d1708d40a0ad1ad60bc60e8f952bc151d09e72c55cb841acc45a60375e2909ae
SHA51293c5b22c824bd7c788cee7fab4e5037aec040636e1a84d330ec030db40e4ecc303e41331876089e5ce3e97892c3c836eddb9eef5834d8f6182f7c912de7a6c7c