Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/03/2024, 02:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-06_38f0a7c3ead3aa487c7adb07e947953f_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-06_38f0a7c3ead3aa487c7adb07e947953f_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-06_38f0a7c3ead3aa487c7adb07e947953f_mafia.exe
-
Size
468KB
-
MD5
38f0a7c3ead3aa487c7adb07e947953f
-
SHA1
4577034105bb1c530d3582c568733b44bb3270b4
-
SHA256
7e206c080023457728501218594fb5a08b70a66a87b439481fd0dc17611d8612
-
SHA512
5552faa80f794b748245b98e80220c5ed57d83282f7e955a4f034cbb55d0445ba00945742eb2f2e725d0dd647265aac602a83380abf9e35cb5cfacd46e016c17
-
SSDEEP
12288:qO4rfItL8HGQeVmFCNJzNIfzN27bWmeEVGL:qO4rQtGGVVmmbILN2umeEVGL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2816 ED0.tmp -
Executes dropped EXE 1 IoCs
pid Process 2816 ED0.tmp -
Loads dropped DLL 1 IoCs
pid Process 2964 2024-03-06_38f0a7c3ead3aa487c7adb07e947953f_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2816 2964 2024-03-06_38f0a7c3ead3aa487c7adb07e947953f_mafia.exe 28 PID 2964 wrote to memory of 2816 2964 2024-03-06_38f0a7c3ead3aa487c7adb07e947953f_mafia.exe 28 PID 2964 wrote to memory of 2816 2964 2024-03-06_38f0a7c3ead3aa487c7adb07e947953f_mafia.exe 28 PID 2964 wrote to memory of 2816 2964 2024-03-06_38f0a7c3ead3aa487c7adb07e947953f_mafia.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-06_38f0a7c3ead3aa487c7adb07e947953f_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-06_38f0a7c3ead3aa487c7adb07e947953f_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\ED0.tmp"C:\Users\Admin\AppData\Local\Temp\ED0.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-03-06_38f0a7c3ead3aa487c7adb07e947953f_mafia.exe B4163A81981013C0905125868DA9FA2B57CE3F480F4BF69CBD8436969FDE7DCC9DDA8C6ED5EF9C940C72FB8A5E4F998340627EC58C0274FC123EF8AEF9CDE8D72⤵
- Deletes itself
- Executes dropped EXE
PID:2816
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
468KB
MD5f58c859dd20e3be1b3f48e59b0a91be5
SHA16d8b0f8c41a612085cf475691ce6ada7cf6ee22a
SHA256f7cd927227ecf64b5a26728e10c6a835a11235bce8bdc766cc965a187d589453
SHA51260d1287cddcccb9c0f737b59c4db9ebd8269a609896be89cc84e4a40115f38363af940d75da85b8b514a513574e75d4b344c0d140d9e74a3a6bbaf82e1413e61