Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/02/2024, 06:05

General

  • Target

    2024-02-20_b8905d024033e22df9be4d39382e2faf_mafia.exe

  • Size

    479KB

  • MD5

    b8905d024033e22df9be4d39382e2faf

  • SHA1

    baab4f1de99da6d2010f3dd4cf7cfcabe0cbb9de

  • SHA256

    01b546f827d782c6d14d755f73dc0934a19e717cce04404cd278cffe34797cf2

  • SHA512

    b224db39377e6e2072d94df5aba8879220cff29d4fb35af2dad90d6c10de6267d82caec229069cea2ef9a8082f76129297b3527061879f19d1ca7acc489e77f0

  • SSDEEP

    12288:bO4rfItL8HAxVIANIMZ2PVsUXlgvoJ3pFq75UO:bO4rQtGAxx8PVsUKykVUO

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-20_b8905d024033e22df9be4d39382e2faf_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-20_b8905d024033e22df9be4d39382e2faf_mafia.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:980
    • C:\Users\Admin\AppData\Local\Temp\789B.tmp
      "C:\Users\Admin\AppData\Local\Temp\789B.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-20_b8905d024033e22df9be4d39382e2faf_mafia.exe 32FF5F49F9BA2C7F30304AACE5E35AA907FEE76D9AC9B9CADFE037202F1E917C0CD6C78FF21A059673EE690BC6E259ED9A19BCF4800C5111B88538168D7CF07A
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:3824

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\789B.tmp

    Filesize

    479KB

    MD5

    d3b1d8933f8088e63180bb00aafc3999

    SHA1

    0535979bf9c45222f661aac19b79f64193470a4d

    SHA256

    d1708d40a0ad1ad60bc60e8f952bc151d09e72c55cb841acc45a60375e2909ae

    SHA512

    93c5b22c824bd7c788cee7fab4e5037aec040636e1a84d330ec030db40e4ecc303e41331876089e5ce3e97892c3c836eddb9eef5834d8f6182f7c912de7a6c7c