Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
23/02/2024, 06:35
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-23_3bb54f64202dea97196c448aa33ac66b_mafia.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-02-23_3bb54f64202dea97196c448aa33ac66b_mafia.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-23_3bb54f64202dea97196c448aa33ac66b_mafia.exe
-
Size
486KB
-
MD5
3bb54f64202dea97196c448aa33ac66b
-
SHA1
ec89030d3158ac870cd01063e4181f1787a55eac
-
SHA256
a61d9770821bd05f7f979cdeafe472c2d6d4bbcb8d2d8981088bd82bebaec1e6
-
SHA512
3c74e6d4f54036f7d07a9f974d16f87add4bf01828dc8d3cd0ab13382da23e9649eebd41b1ebb40aaaa8dac8503946a748b570fa91572f9ce0e5dd32b2bc7ba9
-
SSDEEP
12288:3O4rfItL8HPRMHsAcKkRcQtqCRxitrvNwJFX++7rKxUYXhW:3O4rQtGPSHlkaYxY5vUs+3KxUYXhW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2340 1140.tmp -
Executes dropped EXE 1 IoCs
pid Process 2340 1140.tmp -
Loads dropped DLL 1 IoCs
pid Process 2356 2024-02-23_3bb54f64202dea97196c448aa33ac66b_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2340 2356 2024-02-23_3bb54f64202dea97196c448aa33ac66b_mafia.exe 29 PID 2356 wrote to memory of 2340 2356 2024-02-23_3bb54f64202dea97196c448aa33ac66b_mafia.exe 29 PID 2356 wrote to memory of 2340 2356 2024-02-23_3bb54f64202dea97196c448aa33ac66b_mafia.exe 29 PID 2356 wrote to memory of 2340 2356 2024-02-23_3bb54f64202dea97196c448aa33ac66b_mafia.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-23_3bb54f64202dea97196c448aa33ac66b_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-23_3bb54f64202dea97196c448aa33ac66b_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\1140.tmp"C:\Users\Admin\AppData\Local\Temp\1140.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-23_3bb54f64202dea97196c448aa33ac66b_mafia.exe 541D59814BC2928F920603EE019FCCEC7A2772EE8D612D10342FC55291642215C70DC4A57E8B5873755C40D31DA1DF2A5036915CDE6AF94F049B07266D3143B52⤵
- Deletes itself
- Executes dropped EXE
PID:2340
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
486KB
MD5f725ab692254ce78ff173c88aa82127a
SHA132efaf5d47a86d7444869305facdbed84f6db55c
SHA256b1092a67b8db5a47632e925c1da3f10bc8a498919d07f4c882c56181b97569bc
SHA51209e112604f550724d1a472dcf7d74b5291ebc6ab661aed8c5cccde5d978ffe0d5704a721232af9361b7bba70fa6a4bcd4cda008e1c385e04cc27de4feb03c68e