Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/02/2024, 10:37
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-22_7d4c03da71bc973bb600fa3cc2fd01ad_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-22_7d4c03da71bc973bb600fa3cc2fd01ad_mafia.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-22_7d4c03da71bc973bb600fa3cc2fd01ad_mafia.exe
-
Size
473KB
-
MD5
7d4c03da71bc973bb600fa3cc2fd01ad
-
SHA1
9f9de8455f06063491fcb6694753aa6400de3372
-
SHA256
89427622299df212bddbb15d6d0b2a5bd1990a6c868558b0f0ad5a7a89fec872
-
SHA512
5c1c54308227a5145d1ed4b5f6c24cec2c1afbb0f8c7c760144bfa49656fbb405d9d903e9512920f8da09a181d0e22ae1c27d4b1ab2b500bacac429a328cefca
-
SSDEEP
12288:Nb4bZudi79Lr50rO4KjqIVMRDJmGmjA0a:Nb4bcdkLqrO4KjqIuRwGh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2772 513C.tmp -
Executes dropped EXE 1 IoCs
pid Process 2772 513C.tmp -
Loads dropped DLL 1 IoCs
pid Process 1680 2024-02-22_7d4c03da71bc973bb600fa3cc2fd01ad_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2772 1680 2024-02-22_7d4c03da71bc973bb600fa3cc2fd01ad_mafia.exe 28 PID 1680 wrote to memory of 2772 1680 2024-02-22_7d4c03da71bc973bb600fa3cc2fd01ad_mafia.exe 28 PID 1680 wrote to memory of 2772 1680 2024-02-22_7d4c03da71bc973bb600fa3cc2fd01ad_mafia.exe 28 PID 1680 wrote to memory of 2772 1680 2024-02-22_7d4c03da71bc973bb600fa3cc2fd01ad_mafia.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-22_7d4c03da71bc973bb600fa3cc2fd01ad_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-22_7d4c03da71bc973bb600fa3cc2fd01ad_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\513C.tmp"C:\Users\Admin\AppData\Local\Temp\513C.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-22_7d4c03da71bc973bb600fa3cc2fd01ad_mafia.exe 3F00AE871F8D65811E88208532C7B5321D23B8066596E6928F98C1CEF1BFDBA9D1CA9B7F9C43481D1BDA084CD376A120F74C08862B0A22955C1BA99911A251332⤵
- Deletes itself
- Executes dropped EXE
PID:2772
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
473KB
MD5e5a50af66054a493ebef50a4c1ea35a9
SHA1894c7631a9f9ff160b18c46b75c62e5eba6961e9
SHA2561f8a2e214dc87ae6190df68b33b4d93ccd28de09f75f3f2079730bdcbed2e28d
SHA512cbaa712d3dfe3be2a8d586e1feae845fa5e1cf2e669e9a1d151127858934872e2e565249a6e5d297322a8e44073c20212ac827ea7f239c895a9de99bab332eaa