Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/03/2024, 08:34
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-05_6f70b9bb3d2326f403bb87b2c142776c_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-05_6f70b9bb3d2326f403bb87b2c142776c_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-05_6f70b9bb3d2326f403bb87b2c142776c_mafia.exe
-
Size
468KB
-
MD5
6f70b9bb3d2326f403bb87b2c142776c
-
SHA1
bb893e23c3e432a6b9c880926bc5819a550a5918
-
SHA256
44c0cff359bd49b81254dbf640e60e3eb6e7182e3b4048b9ec8a611f6466ce82
-
SHA512
1d1876e0ed6660d4797855c1e10e8b8740b9d3b3e519b3024b2000a6a8f7706565b5ce2d97432f05cebc0bea0ba94c400a4632728575f9feb65e040b5be931d0
-
SSDEEP
12288:qO4rfItL8HGKblc6gxXfHsmwNiD7bWmeEVGL:qO4rQtGGPxvMlN0umeEVGL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2732 22FB.tmp -
Executes dropped EXE 1 IoCs
pid Process 2732 22FB.tmp -
Loads dropped DLL 1 IoCs
pid Process 2160 2024-03-05_6f70b9bb3d2326f403bb87b2c142776c_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2732 2160 2024-03-05_6f70b9bb3d2326f403bb87b2c142776c_mafia.exe 28 PID 2160 wrote to memory of 2732 2160 2024-03-05_6f70b9bb3d2326f403bb87b2c142776c_mafia.exe 28 PID 2160 wrote to memory of 2732 2160 2024-03-05_6f70b9bb3d2326f403bb87b2c142776c_mafia.exe 28 PID 2160 wrote to memory of 2732 2160 2024-03-05_6f70b9bb3d2326f403bb87b2c142776c_mafia.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_6f70b9bb3d2326f403bb87b2c142776c_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-05_6f70b9bb3d2326f403bb87b2c142776c_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\22FB.tmp"C:\Users\Admin\AppData\Local\Temp\22FB.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-03-05_6f70b9bb3d2326f403bb87b2c142776c_mafia.exe 31116E5A8D1EF9B5D9C87E3F643D7572E569A31733A169E1E3383023F7F274B750315F7ADB4DE39A4821980FD899EC7A71A3F344D9F1040CAAB5A14024707AC72⤵
- Deletes itself
- Executes dropped EXE
PID:2732
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
468KB
MD5b4e80c1f8d91a6a893ebbf4e52140def
SHA1fb13c564a121f353d815d8fca05230d9228ad421
SHA2563c612ea8f76df6030900896560f957ffca94a8c629dd03ca7a70c0ba89ae4f3f
SHA512742db6132f0229d3fe0cc1b4a47b1b8a183cdb82deacb70fd80ae1a7abdaf9e15b5b4a20d2bab70aceea55b46ea60e941f43eb76748b9d3b61aad01d39ba503f