Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
96s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 12:51
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-24_f7f4bca95ffb498e0ffc5efe1c57c121_mafia.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-02-24_f7f4bca95ffb498e0ffc5efe1c57c121_mafia.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-24_f7f4bca95ffb498e0ffc5efe1c57c121_mafia.exe
-
Size
473KB
-
MD5
f7f4bca95ffb498e0ffc5efe1c57c121
-
SHA1
85a9ece8f5b70f54cd00c4104f5db93fc56e7be0
-
SHA256
4cc9accc18cb2786528d94817393b1d3d4d01dc303c88bf1ba803c83564f0259
-
SHA512
2c2e950bfa809ad017a29190664c721dc2629c6ecb84efdee82af99ad7f164f3bff36e66e967be856dd3c8b700f82f29b3c8c46d93a6096a0e8acb58187792fe
-
SSDEEP
12288:Nb4bZudi79LKFafjjZYbVX0yMRZzbkCg3SJoRs7A0a:Nb4bcdkLOarjZYbGHug+
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3616 6736.tmp -
Executes dropped EXE 1 IoCs
pid Process 3616 6736.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2496 wrote to memory of 3616 2496 2024-02-24_f7f4bca95ffb498e0ffc5efe1c57c121_mafia.exe 86 PID 2496 wrote to memory of 3616 2496 2024-02-24_f7f4bca95ffb498e0ffc5efe1c57c121_mafia.exe 86 PID 2496 wrote to memory of 3616 2496 2024-02-24_f7f4bca95ffb498e0ffc5efe1c57c121_mafia.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-24_f7f4bca95ffb498e0ffc5efe1c57c121_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-24_f7f4bca95ffb498e0ffc5efe1c57c121_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\6736.tmp"C:\Users\Admin\AppData\Local\Temp\6736.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-24_f7f4bca95ffb498e0ffc5efe1c57c121_mafia.exe 407E14A2333C7C3424083B48ED398024739782FD0F935499EB12EB35CD3A16D4F5E548E6AB14E21299329FBFE3CD7E085D08EF782666A1CCA438BF2F08B6F4712⤵
- Deletes itself
- Executes dropped EXE
PID:3616
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
473KB
MD53563625c82d37ba852868685322baf9e
SHA154403ff049d077734cd7cee15017c94ba574002b
SHA256f1522b77f53e8b95d266d296b0bda456cb78270f1057131230a98cbffb17bb29
SHA512e67ff441451c0bdd439c09f8d8ee65b6b9f4545e7606ad06c182d3d1a29191cb757464b8584b5f3a441ae4dc54be02bc3752aeba70fc828e3239bbc025d39dac