Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
112s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 11:49
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-28_d1d7ded47235a96f0e29969ba3b4d4bd_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-28_d1d7ded47235a96f0e29969ba3b4d4bd_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-02-28_d1d7ded47235a96f0e29969ba3b4d4bd_mafia.exe
-
Size
476KB
-
MD5
d1d7ded47235a96f0e29969ba3b4d4bd
-
SHA1
6858f0b77a89f8eab4cb78f3b3ecd3c38206872b
-
SHA256
14df440689a9585151fd394cb57e949d9ddae9d6b295c906597fb33680b19685
-
SHA512
951f8c62d47527d0468b482a7645eb9f282e12da3aa8ba4844f237268be9287e6603f18d8274b6877489ec972e03669b76d7e805a4444ce5bea33362e7b4b1b9
-
SSDEEP
12288:aO4rfItL8HRjI3XqaoRsjk8MIM2Bg7K9wlsDpVFd:aO4rQtGRuXqaoRt8Oj+9wlsDpVFd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2112 A8A4.tmp -
Executes dropped EXE 1 IoCs
pid Process 2112 A8A4.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 660 wrote to memory of 2112 660 2024-02-28_d1d7ded47235a96f0e29969ba3b4d4bd_mafia.exe 87 PID 660 wrote to memory of 2112 660 2024-02-28_d1d7ded47235a96f0e29969ba3b4d4bd_mafia.exe 87 PID 660 wrote to memory of 2112 660 2024-02-28_d1d7ded47235a96f0e29969ba3b4d4bd_mafia.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-28_d1d7ded47235a96f0e29969ba3b4d4bd_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-28_d1d7ded47235a96f0e29969ba3b4d4bd_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Users\Admin\AppData\Local\Temp\A8A4.tmp"C:\Users\Admin\AppData\Local\Temp\A8A4.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-02-28_d1d7ded47235a96f0e29969ba3b4d4bd_mafia.exe DB904B84972C822476E7275F0082D6A134C20EF04AE031F73E049BF3B1A652A0C41903597183B0108626B232ACBDB3F455F35931F752154FF4DBDC37B9C037FE2⤵
- Deletes itself
- Executes dropped EXE
PID:2112
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
476KB
MD57513790edde5dd505814c972d6411965
SHA1f24ca2cfc0c29bf7cc34e74a0cc36555cc25c78b
SHA256e22128ae9432731e62ff1f97bb42df1fce04e11acc7d37f5f795215ce9c8a990
SHA512b1079cb6a37f5ef98045e1cc4c1c149768cba5b7c3facd97d6d3ae155cb14c241f45a9ccd61d89f2492811f78167d37ae021ffe0ef4b2bc4c4bf932b2aae4307