Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/02/2024, 16:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-21_367eb07ae672376a00e19b1bfcf14e4c_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-21_367eb07ae672376a00e19b1bfcf14e4c_mafia.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-21_367eb07ae672376a00e19b1bfcf14e4c_mafia.exe
-
Size
473KB
-
MD5
367eb07ae672376a00e19b1bfcf14e4c
-
SHA1
fbea9bc39594e446b69a3a00f380f3e86681a5a2
-
SHA256
4234d317cc91c388b1c4fe75783535132ec17ee1af9a54f903896630eb422e5c
-
SHA512
ae45bc58ae1b92c5165f83a2d738ee14227f197434107065389b6953656c5fe1b501554d60e4662099e5d99994c0b55c46b936f413cdc4105eb5c3f967211294
-
SSDEEP
6144:fFrJxvldL4c5ONK1xgWbd1s79+iStQx4j72OVHIzcPEZXLY5MiIprrbjvPDl/2sN:Nb4bZudi79LMjDVHvEZcD2rT4J6mbA0a
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2848 68A2.tmp -
Executes dropped EXE 1 IoCs
pid Process 2848 68A2.tmp -
Loads dropped DLL 1 IoCs
pid Process 2068 2024-02-21_367eb07ae672376a00e19b1bfcf14e4c_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2848 2068 2024-02-21_367eb07ae672376a00e19b1bfcf14e4c_mafia.exe 28 PID 2068 wrote to memory of 2848 2068 2024-02-21_367eb07ae672376a00e19b1bfcf14e4c_mafia.exe 28 PID 2068 wrote to memory of 2848 2068 2024-02-21_367eb07ae672376a00e19b1bfcf14e4c_mafia.exe 28 PID 2068 wrote to memory of 2848 2068 2024-02-21_367eb07ae672376a00e19b1bfcf14e4c_mafia.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-21_367eb07ae672376a00e19b1bfcf14e4c_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-21_367eb07ae672376a00e19b1bfcf14e4c_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\68A2.tmp"C:\Users\Admin\AppData\Local\Temp\68A2.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-21_367eb07ae672376a00e19b1bfcf14e4c_mafia.exe D93E4D8C5D682FA324572C9F9276F29E2788110BFF23BF718DC5C51BD04695B086E1874D08F3083844CEF2C6E09720061574D4AFCA1AB8347D8AB5B9C22789F42⤵
- Deletes itself
- Executes dropped EXE
PID:2848
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
473KB
MD56a8a68d1acfdac307c3181dad8cd9922
SHA1998d516d2e72306c16b7cd39d01b8c3474b6ba8a
SHA256426624d055184d290ec6165c82aaa5062c29104da4d3861d99c40395b219376e
SHA5120a18316a61856ec9821a71838356e8e59efb149197c6b8cc39959373cbec17bebbf4b7c52b56b266a11e45c55a800e53e43cf87f3062073c9ba9d0f35fbb116d