Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
159s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 02:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-06_38f0a7c3ead3aa487c7adb07e947953f_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-06_38f0a7c3ead3aa487c7adb07e947953f_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-06_38f0a7c3ead3aa487c7adb07e947953f_mafia.exe
-
Size
468KB
-
MD5
38f0a7c3ead3aa487c7adb07e947953f
-
SHA1
4577034105bb1c530d3582c568733b44bb3270b4
-
SHA256
7e206c080023457728501218594fb5a08b70a66a87b439481fd0dc17611d8612
-
SHA512
5552faa80f794b748245b98e80220c5ed57d83282f7e955a4f034cbb55d0445ba00945742eb2f2e725d0dd647265aac602a83380abf9e35cb5cfacd46e016c17
-
SSDEEP
12288:qO4rfItL8HGQeVmFCNJzNIfzN27bWmeEVGL:qO4rQtGGVVmmbILN2umeEVGL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3752 1A59.tmp -
Executes dropped EXE 1 IoCs
pid Process 3752 1A59.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1700 wrote to memory of 3752 1700 2024-03-06_38f0a7c3ead3aa487c7adb07e947953f_mafia.exe 95 PID 1700 wrote to memory of 3752 1700 2024-03-06_38f0a7c3ead3aa487c7adb07e947953f_mafia.exe 95 PID 1700 wrote to memory of 3752 1700 2024-03-06_38f0a7c3ead3aa487c7adb07e947953f_mafia.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-06_38f0a7c3ead3aa487c7adb07e947953f_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-06_38f0a7c3ead3aa487c7adb07e947953f_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\1A59.tmp"C:\Users\Admin\AppData\Local\Temp\1A59.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-03-06_38f0a7c3ead3aa487c7adb07e947953f_mafia.exe CD35899C141CF28B44F4C8435B403F033C590EA81EC5ADC7983265CB8A7E1840709E0EC5046944D5E67035EAACD22666675E7576F091BCAD9263F40A9494F5C92⤵
- Deletes itself
- Executes dropped EXE
PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2368 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:81⤵PID:4504
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
468KB
MD5e224c9c9ea6d8b4545cefb1271a09a49
SHA12855452affb8c48cf76d85cd8ed0df07a89edd1c
SHA256a5fd9fd4a6355c7087b4446e087aad90ecc20bf65127841fcd3b9d5a2e7b74d3
SHA51239d93a3c300c758261f60630eb683a63956baa228709c7360eb3e1e7d5f8e3610657580e11f175d703ab2835e28991a097ea794664f8130452627c6098f16e0e