Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
23/02/2024, 05:04
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-23_da0fc92750dd64b888876dff6c5bca74_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-23_da0fc92750dd64b888876dff6c5bca74_mafia.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-23_da0fc92750dd64b888876dff6c5bca74_mafia.exe
-
Size
411KB
-
MD5
da0fc92750dd64b888876dff6c5bca74
-
SHA1
a0e420aec10c6e50499ed2903b8f4c705408d83f
-
SHA256
9ea7c1cbca67fd127786d37168fac2babc097a559cde9185e2cae1b6c7d7417d
-
SHA512
02eecd1fd6304e9b3ee5aa3a29101065627938bdb33195e605ebda811bcd2050624bf115fef3fbc160d680f608b5ceebce2a831bc15429fa9db65f3cf5a2be2f
-
SSDEEP
6144:gVdvczEb7GUOpYWhNVynE/mFUqVdJE2WnFEaMyqv6+XxbKyP923XpwmLqHI:gZLolhNVyEzwJE5j9q5xH2pvLqHI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3840 EB3B.tmp -
Executes dropped EXE 1 IoCs
pid Process 3840 EB3B.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 100 wrote to memory of 3840 100 2024-02-23_da0fc92750dd64b888876dff6c5bca74_mafia.exe 86 PID 100 wrote to memory of 3840 100 2024-02-23_da0fc92750dd64b888876dff6c5bca74_mafia.exe 86 PID 100 wrote to memory of 3840 100 2024-02-23_da0fc92750dd64b888876dff6c5bca74_mafia.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-23_da0fc92750dd64b888876dff6c5bca74_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-23_da0fc92750dd64b888876dff6c5bca74_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Users\Admin\AppData\Local\Temp\EB3B.tmp"C:\Users\Admin\AppData\Local\Temp\EB3B.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-02-23_da0fc92750dd64b888876dff6c5bca74_mafia.exe 8D7353911D4BB8F5DED292041A73E6AE7CCD1D6E0841E28F363DE7A79B8E59A7859E9E018C8227B62B89C0FB7FF02468B884D4BC640339A5F39B2553F466FC322⤵
- Deletes itself
- Executes dropped EXE
PID:3840
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
411KB
MD5634cd49a88b467fe3215506846dfbb24
SHA1ba9e1713bd7ea3228667f75071cfaf03626003a6
SHA25601ac0ba68fb63455207b4783ff538dadb4709157a32d1a16d1a9a49237afaeba
SHA51202eec5223b114d91bb83a651dc8f043ace0f67b1915bc29d2a91abdd0a1bddfa86bc561a5b6699581873ce9254de18ae839bb62b0ecb6e87f83ab53a2ea63bf6