Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240220-en -
resource tags
arch:x64arch:x86image:win10v2004-20240220-enlocale:en-usos:windows10-2004-x64system -
submitted
20/02/2024, 20:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-20_f4872021778f0f0c8cdeeadf7f3dacb6_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-20_f4872021778f0f0c8cdeeadf7f3dacb6_mafia.exe
Resource
win10v2004-20240220-en
General
-
Target
2024-02-20_f4872021778f0f0c8cdeeadf7f3dacb6_mafia.exe
-
Size
411KB
-
MD5
f4872021778f0f0c8cdeeadf7f3dacb6
-
SHA1
ed5ce574d60c1d3d167bd6c3a338cef925866795
-
SHA256
4448477b9d882311c5dffa603d570c0fb9e1f836a8ab580b4d9cca502bd5c323
-
SHA512
ca7da35c79cd5f474e2790de685674c67e09afa4b6968da35bedcf20e032cf2f95e0dbcc8a1fbcd5c17abff1367b4d71f0823638e83e481accb27d23d59b9605
-
SSDEEP
6144:gVdvczEb7GUOpYWhNVynE/mFGm4w/duxDOJw7wkq3WSSRmbzDl/SqHI:gZLolhNVyEtu/Qx6Jw0XGSSYzxSqHI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1892 4249.tmp -
Executes dropped EXE 1 IoCs
pid Process 1892 4249.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1188 wrote to memory of 1892 1188 2024-02-20_f4872021778f0f0c8cdeeadf7f3dacb6_mafia.exe 85 PID 1188 wrote to memory of 1892 1188 2024-02-20_f4872021778f0f0c8cdeeadf7f3dacb6_mafia.exe 85 PID 1188 wrote to memory of 1892 1188 2024-02-20_f4872021778f0f0c8cdeeadf7f3dacb6_mafia.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-20_f4872021778f0f0c8cdeeadf7f3dacb6_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-20_f4872021778f0f0c8cdeeadf7f3dacb6_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\4249.tmp"C:\Users\Admin\AppData\Local\Temp\4249.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-02-20_f4872021778f0f0c8cdeeadf7f3dacb6_mafia.exe 9488928BCFA749CFF8F35BC5B460BA5CB1CA0267B27BAA3D978056B8C7384AD608BB0FADF5442F97BB0858440146324DF16E82CCC44F999F1ED0F86790D60EEA2⤵
- Deletes itself
- Executes dropped EXE
PID:1892
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
411KB
MD530d6122cc0412f1a108df7f4879c2e32
SHA16f5289b0b2ce672dec16504c2f002dacb6e12c8c
SHA256e581564d5414877931e2d7da9c91f2e173dcceb2c0a184c471fdb7c511977e78
SHA5123454b8c607e0d9fbca8167053f75de28b530d4793e485d820c4a472ff70710de497ba00f93c68d236be599f57ccd13890a6af7633476ee6465cbae95b854d0ff