Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 13:52
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-06_f88bc92613a88f09469b64fcafacdcac_mafia.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-03-06_f88bc92613a88f09469b64fcafacdcac_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-06_f88bc92613a88f09469b64fcafacdcac_mafia.exe
-
Size
476KB
-
MD5
f88bc92613a88f09469b64fcafacdcac
-
SHA1
f5acd8e4e94c97d59fb990f7fdd78bd3b7974878
-
SHA256
728d643c9be93d948906e60fb56487ff1bb95acef33248db52c2ee764c27b463
-
SHA512
15f8ba31716ef055489ab5d2f288c32f12d191e1ac8c55c9a5eb9839e56984e34d32661076d6d31f1418337cf7e038dcd5e0914b106dec3d4e1406a4299a1c99
-
SSDEEP
12288:aO4rfItL8HR2gJgXDkyrNUFJGMzJrPpGBn87K9wlsDpVFd:aO4rQtGRHuaFDPUn8+9wlsDpVFd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4824 2E72.tmp -
Executes dropped EXE 1 IoCs
pid Process 4824 2E72.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3568 wrote to memory of 4824 3568 2024-03-06_f88bc92613a88f09469b64fcafacdcac_mafia.exe 89 PID 3568 wrote to memory of 4824 3568 2024-03-06_f88bc92613a88f09469b64fcafacdcac_mafia.exe 89 PID 3568 wrote to memory of 4824 3568 2024-03-06_f88bc92613a88f09469b64fcafacdcac_mafia.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-06_f88bc92613a88f09469b64fcafacdcac_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-06_f88bc92613a88f09469b64fcafacdcac_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\2E72.tmp"C:\Users\Admin\AppData\Local\Temp\2E72.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-03-06_f88bc92613a88f09469b64fcafacdcac_mafia.exe 81A32603AE4C5DA80D76422528FC58D30AB417783F593B368BABA72E460998812255AE8A331AC0B43F3E8EAFDE99712C9078C62470D7237F160F526ACFA211DC2⤵
- Deletes itself
- Executes dropped EXE
PID:4824
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
476KB
MD5069fc943c58f7ae961807474a4133c4a
SHA108854385a14991f7548597aecc0351d5960cd9c4
SHA256a87b447d296d21897a8c2117291438b9e6f7beebc0f405313b9e5b735ea5d74e
SHA51203de3051d142ea79833c0e4722fe586171987381277943eff5823f9aed10e943ecb35a079ea5f3a510dd90cb4527708beeb8d4efaa8f36a8bd88755a0a0e26d6