Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 21:33
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-24_7e8311e304cd54fa3b63fb386bf86a3e_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-24_7e8311e304cd54fa3b63fb386bf86a3e_mafia.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-24_7e8311e304cd54fa3b63fb386bf86a3e_mafia.exe
-
Size
486KB
-
MD5
7e8311e304cd54fa3b63fb386bf86a3e
-
SHA1
c7c085af761980b31b4798bc8c8e338bb6ff29c2
-
SHA256
cdc3c919e0ba1e2d7db2a2663a44d09e556dc4806cf77fb9cdb3879d6f0ee802
-
SHA512
e6227fcb3a0364c210f68942c5da1e7bc6c57951f152f77c1af79c8b934c1862037a9f5c1250d232af7c92a73bea55a1c31f10b52b1dc5a06545c45148754372
-
SSDEEP
12288:3O4rfItL8HPTLYkzQGmkeAqQR0oaRUkfR7oBp7rKxUYXhW:3O4rQtGPAkBmkeZQRnKof3KxUYXhW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 32 4263.tmp -
Executes dropped EXE 1 IoCs
pid Process 32 4263.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4976 wrote to memory of 32 4976 2024-02-24_7e8311e304cd54fa3b63fb386bf86a3e_mafia.exe 85 PID 4976 wrote to memory of 32 4976 2024-02-24_7e8311e304cd54fa3b63fb386bf86a3e_mafia.exe 85 PID 4976 wrote to memory of 32 4976 2024-02-24_7e8311e304cd54fa3b63fb386bf86a3e_mafia.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-24_7e8311e304cd54fa3b63fb386bf86a3e_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-24_7e8311e304cd54fa3b63fb386bf86a3e_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\4263.tmp"C:\Users\Admin\AppData\Local\Temp\4263.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-24_7e8311e304cd54fa3b63fb386bf86a3e_mafia.exe EC2D9679F74CB80B385537A9AFBB79222EACEC1BB22ACF0FC3FDE596125AF535C4BD08B3BAE9E4F6074FE1FDA17D4AE151086E86457594FE3C29301E646080B02⤵
- Deletes itself
- Executes dropped EXE
PID:32
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
486KB
MD5e9fc1ffda9cb3d37d3f0c11513f780aa
SHA1af348ef7e84a110d8b68f510532f537194e53a67
SHA256447b0448bbc851d226e2ec412de785d483dbe662c2fedb744debc7155d018417
SHA512933dbf15f673093f501b224f0536bab5e65f9ac9e71857371f8c561b8849bbd183a5f5ab2fefa1f87c28a09601d6950d482827bfe9103da730e12edb6a7adf84