Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 09:09
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-28_e806fe42f27c211b0dfb428b87d0c0ed_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-28_e806fe42f27c211b0dfb428b87d0c0ed_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-02-28_e806fe42f27c211b0dfb428b87d0c0ed_mafia.exe
-
Size
443KB
-
MD5
e806fe42f27c211b0dfb428b87d0c0ed
-
SHA1
d706080148514213e79c7b52584e7d78291c43ca
-
SHA256
d0cb12ac328d52fddad1505165ec469fba2f6506043c69d5036db3209ccd2aea
-
SHA512
540430a68120f4049fb901cf8904d6c7aa02d59a846b6d662c2cad098205b879b9673a35830788414df1efb0860ab142a5085a1b3c2d7b726a4427896561a5d6
-
SSDEEP
12288:Wq4w/ekieZgU618OErRtUB1Zqa27v/eGRlMa:Wq4w/ekieH66IwhRP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 836 34EB.tmp -
Executes dropped EXE 1 IoCs
pid Process 836 34EB.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2820 wrote to memory of 836 2820 2024-02-28_e806fe42f27c211b0dfb428b87d0c0ed_mafia.exe 88 PID 2820 wrote to memory of 836 2820 2024-02-28_e806fe42f27c211b0dfb428b87d0c0ed_mafia.exe 88 PID 2820 wrote to memory of 836 2820 2024-02-28_e806fe42f27c211b0dfb428b87d0c0ed_mafia.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-28_e806fe42f27c211b0dfb428b87d0c0ed_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-28_e806fe42f27c211b0dfb428b87d0c0ed_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\34EB.tmp"C:\Users\Admin\AppData\Local\Temp\34EB.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-28_e806fe42f27c211b0dfb428b87d0c0ed_mafia.exe 36A258C2EF2C6D256837EC47670CA95C3F6A7CDCE47CAB9E2EABCE22AA8ACE2686ACDEF2F6B8BAF2EEBC9C611DF0F7D0DE4CAEAD892F69BF48419583EDA89B532⤵
- Deletes itself
- Executes dropped EXE
PID:836
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
443KB
MD5147d1caff4864edfd385e216a068a0a2
SHA14ccc4aa60a32be64e3085586b5a61d7dc83752b0
SHA256390fd21857b1ef0b0a1c5fa6e17b9854fcfd3eb27b742edc09c937d85d0394f1
SHA512325d2e71d184592ca0f7470a826bc4c5ed667079ffccc2e03626c8fb314904b0d3c5a8f6247a19df55f3f92ee0b75f0bd1117c326fac43301091420d179b1af7