Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 03:47
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-24_71d790d0956e8bd191c97fbb5a146e3c_mafia.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-02-24_71d790d0956e8bd191c97fbb5a146e3c_mafia.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-24_71d790d0956e8bd191c97fbb5a146e3c_mafia.exe
-
Size
412KB
-
MD5
71d790d0956e8bd191c97fbb5a146e3c
-
SHA1
1a7f1ba12df2e40070976724f26150d7e9ff7ef9
-
SHA256
adb822f8a58310cfb521fed0f2b1801bc326ee8e93b14c79cf99e8663dc39bed
-
SHA512
71cfc5629d3948a93548e3a5a910292d1a0c65773e0686d4f93c9344f2c869078df27d037770760e2abcfc646be7a38acc5154815df148bf3b297524eee47a21
-
SSDEEP
6144:UooTAQjKG3wDGAeIc9kphIoDZnXkxPAnZ2lYBGjN330J8z/lJ9C4HpP:U6PCrIc9kph5ZkxPCVG9R/lJw4Z
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1348 56CB.tmp -
Executes dropped EXE 1 IoCs
pid Process 1348 56CB.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 692 wrote to memory of 1348 692 2024-02-24_71d790d0956e8bd191c97fbb5a146e3c_mafia.exe 89 PID 692 wrote to memory of 1348 692 2024-02-24_71d790d0956e8bd191c97fbb5a146e3c_mafia.exe 89 PID 692 wrote to memory of 1348 692 2024-02-24_71d790d0956e8bd191c97fbb5a146e3c_mafia.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-24_71d790d0956e8bd191c97fbb5a146e3c_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-24_71d790d0956e8bd191c97fbb5a146e3c_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Users\Admin\AppData\Local\Temp\56CB.tmp"C:\Users\Admin\AppData\Local\Temp\56CB.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-02-24_71d790d0956e8bd191c97fbb5a146e3c_mafia.exe C110FFEF73B6CD0432204B1AA8F7B30FCF2EA2684A05764CAB527BB71E18BCECC553BC463EB9DB5AEB6EB0286C4F401390D4743926F6408B49B20ECCC68CF1A52⤵
- Deletes itself
- Executes dropped EXE
PID:1348
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD5cba4904dac6e5df74662b63fa87a3461
SHA17c9670a307befffd0a708a0731a41146efefcc03
SHA2569c0db88206ebfe3df1ba7c520389a19a5683b0c0c6bafe74042cc18f53bdfc28
SHA512e4c5b8ec9ffcf1fcd20a3bd67c29c164318449ba1dd628c028e79b672e58c8bda5dcde29e34bd9f03573e0a9a654d6f05582ce34381ac96a0c2547917a1a8175