Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
23/02/2024, 06:10
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-23_a7c0306b6fea9db40f2eb813834ae528_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-23_a7c0306b6fea9db40f2eb813834ae528_mafia.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-23_a7c0306b6fea9db40f2eb813834ae528_mafia.exe
-
Size
479KB
-
MD5
a7c0306b6fea9db40f2eb813834ae528
-
SHA1
abe6a4a5f123b4464a2259f91d81a0e68d7ef86d
-
SHA256
3cdbacc4d6162a3be2cbf359b8ec2e51e00c256df180a118c82aac7921efe203
-
SHA512
248a14ca06b625ba3bca07b624a022065150e312228d98dfaec4f811b7e8545365394eb6a09f9b124332177b506766f0142e3d09e4ee7c24f701671e0fb77f19
-
SSDEEP
6144:b9EyS4oMxIkjxcWqHtg88HARRku7Eatei33V5a2r7sA3u/MN/ZnNvd5dwL75UNY:bO4rfItL8HALkiao/dJt+75UO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1044 3E41.tmp -
Executes dropped EXE 1 IoCs
pid Process 1044 3E41.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4528 wrote to memory of 1044 4528 2024-02-23_a7c0306b6fea9db40f2eb813834ae528_mafia.exe 86 PID 4528 wrote to memory of 1044 4528 2024-02-23_a7c0306b6fea9db40f2eb813834ae528_mafia.exe 86 PID 4528 wrote to memory of 1044 4528 2024-02-23_a7c0306b6fea9db40f2eb813834ae528_mafia.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-23_a7c0306b6fea9db40f2eb813834ae528_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-23_a7c0306b6fea9db40f2eb813834ae528_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\3E41.tmp"C:\Users\Admin\AppData\Local\Temp\3E41.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-23_a7c0306b6fea9db40f2eb813834ae528_mafia.exe CD45C0B655D940F02DDC6126ECCAB449B83BA9AF7A0AC90D29D12C991B47C5844C3034A160A96F57C7143D5C7674EE134BA273933AA105E9848C0BC712D9490C2⤵
- Deletes itself
- Executes dropped EXE
PID:1044
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
479KB
MD54633b2ac12669ba17d393c289e629b3f
SHA17aaa6f09a1dca48d88182b4056f10422047dccae
SHA2568c5355b61181e2e7c4c51226096f3ae0f66b0cda4dad8b7f1e1491ef1849a5c3
SHA5124b45c25a7b123463b75ce3c02f6d9d95fc4a2313c49806eb22e91c5039ce502c057a484aae9a84da66b344d8230e365f916a7141af6c375a6ea5f0aa07560094