Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2024, 17:48
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-25_ba72a69ccafd4d1345debc9ec043a152_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-25_ba72a69ccafd4d1345debc9ec043a152_mafia.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-25_ba72a69ccafd4d1345debc9ec043a152_mafia.exe
-
Size
412KB
-
MD5
ba72a69ccafd4d1345debc9ec043a152
-
SHA1
b9d56350ab236ee6bc258ec0ae49e1307523a81e
-
SHA256
74e02ccd06c498d0c6f3919d02d9259062720d3b5e607393cc5cb77183825f3d
-
SHA512
d6bb5f85bde33b7531dceccc326809674337f97e4fdde9c41bead9c906c55255a0034e5bc5e5f2a6f4fe60b47e2d66bc36219208435c791a0084e6bc42b2aa1b
-
SSDEEP
6144:UooTAQjKG3wDGAeIc9kphIoDZnw8MrodQfh8mRXdESt2X8STKJGkw31G8P:U6PCrIc9kph5y8Mph8mWX1THL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1764 6F44.tmp -
Executes dropped EXE 1 IoCs
pid Process 1764 6F44.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 540 wrote to memory of 1764 540 2024-02-25_ba72a69ccafd4d1345debc9ec043a152_mafia.exe 86 PID 540 wrote to memory of 1764 540 2024-02-25_ba72a69ccafd4d1345debc9ec043a152_mafia.exe 86 PID 540 wrote to memory of 1764 540 2024-02-25_ba72a69ccafd4d1345debc9ec043a152_mafia.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-25_ba72a69ccafd4d1345debc9ec043a152_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-25_ba72a69ccafd4d1345debc9ec043a152_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\6F44.tmp"C:\Users\Admin\AppData\Local\Temp\6F44.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-02-25_ba72a69ccafd4d1345debc9ec043a152_mafia.exe 02A8EAA98AF2425603F802594AF4CA871333E62BD143B572F00D0DE98CB97E3D0D2B1056FBF9F0845F6006C91139B5980217D613187BED0080141EF5A57B4D572⤵
- Deletes itself
- Executes dropped EXE
PID:1764
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD57783db965f960d78388c9f35e83e2718
SHA10c8b3caffa8541d780f5ba9ddef2b16869dbcf46
SHA25622a8f809aa93662433854e2a2bfe6d080db92bab942bd64b1bffd09f5e133dda
SHA512fb4facb8a8752440b13cecb86b41e2b53c812d946a0aa7b53f7ea2f148b742d2676efa4d7302a968a68b5e41c96e334210d4ce55814fab2a54be63fc075a314b