Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/02/2024, 05:04
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-23_da0fc92750dd64b888876dff6c5bca74_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-23_da0fc92750dd64b888876dff6c5bca74_mafia.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-23_da0fc92750dd64b888876dff6c5bca74_mafia.exe
-
Size
411KB
-
MD5
da0fc92750dd64b888876dff6c5bca74
-
SHA1
a0e420aec10c6e50499ed2903b8f4c705408d83f
-
SHA256
9ea7c1cbca67fd127786d37168fac2babc097a559cde9185e2cae1b6c7d7417d
-
SHA512
02eecd1fd6304e9b3ee5aa3a29101065627938bdb33195e605ebda811bcd2050624bf115fef3fbc160d680f608b5ceebce2a831bc15429fa9db65f3cf5a2be2f
-
SSDEEP
6144:gVdvczEb7GUOpYWhNVynE/mFUqVdJE2WnFEaMyqv6+XxbKyP923XpwmLqHI:gZLolhNVyEzwJE5j9q5xH2pvLqHI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1944 253C.tmp -
Executes dropped EXE 1 IoCs
pid Process 1944 253C.tmp -
Loads dropped DLL 1 IoCs
pid Process 2172 2024-02-23_da0fc92750dd64b888876dff6c5bca74_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 1944 2172 2024-02-23_da0fc92750dd64b888876dff6c5bca74_mafia.exe 28 PID 2172 wrote to memory of 1944 2172 2024-02-23_da0fc92750dd64b888876dff6c5bca74_mafia.exe 28 PID 2172 wrote to memory of 1944 2172 2024-02-23_da0fc92750dd64b888876dff6c5bca74_mafia.exe 28 PID 2172 wrote to memory of 1944 2172 2024-02-23_da0fc92750dd64b888876dff6c5bca74_mafia.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-23_da0fc92750dd64b888876dff6c5bca74_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-23_da0fc92750dd64b888876dff6c5bca74_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\253C.tmp"C:\Users\Admin\AppData\Local\Temp\253C.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-02-23_da0fc92750dd64b888876dff6c5bca74_mafia.exe 2E7E565414F0C9D9545EEC729E5C9FBD64C36BDF4291FB991F067778DB69101F53AE63CE0A13D87A992147F43CFC5EACA60881865EA2120F19FDC92926B8687B2⤵
- Deletes itself
- Executes dropped EXE
PID:1944
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
411KB
MD52b28dab0874c6b826cc4a5670c422c2e
SHA1f5abfe49179d581cb353b70c2f4ee12d4d8d03dc
SHA25661065d9629423efad658b40776b0d952ed2ddd6a27d4d4d2a5346f134801a578
SHA512932c4659833165fb0ba92f959eeb16d81ec30124ae349ed7b028b2f1b1b99d840601e184db0613fca2dcc6dacceca12488808b45375fdb9dabe840562f749c90