Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/03/2024, 14:41
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-07_fab759fb2fe3afe954768961dab742d2_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-07_fab759fb2fe3afe954768961dab742d2_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-07_fab759fb2fe3afe954768961dab742d2_mafia.exe
-
Size
411KB
-
MD5
fab759fb2fe3afe954768961dab742d2
-
SHA1
007efa6dfa570dea5aa170bd1736c1414644e973
-
SHA256
fd768e179b4d7f1b2cd45a04a9a1c0267d6abd2bbc6389151ed2eeff97bd851f
-
SHA512
006616fe331294ff389cdfec89668f5f41edbb896ee7f19856e2a37d23c27a54b22cb6524023fc2379acb613edd3d2e57cdeef0791e126d4a8481a81856663b6
-
SSDEEP
6144:gVdvczEb7GUOpYWhNVynE/mF8dIZTrsDT6pT36UcMEobz5jsEqHI:gZLolhNVyECfsPGzFcw5jsEqHI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2576 49DC.tmp -
Executes dropped EXE 1 IoCs
pid Process 2576 49DC.tmp -
Loads dropped DLL 1 IoCs
pid Process 1152 2024-03-07_fab759fb2fe3afe954768961dab742d2_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1152 wrote to memory of 2576 1152 2024-03-07_fab759fb2fe3afe954768961dab742d2_mafia.exe 28 PID 1152 wrote to memory of 2576 1152 2024-03-07_fab759fb2fe3afe954768961dab742d2_mafia.exe 28 PID 1152 wrote to memory of 2576 1152 2024-03-07_fab759fb2fe3afe954768961dab742d2_mafia.exe 28 PID 1152 wrote to memory of 2576 1152 2024-03-07_fab759fb2fe3afe954768961dab742d2_mafia.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_fab759fb2fe3afe954768961dab742d2_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-07_fab759fb2fe3afe954768961dab742d2_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\49DC.tmp"C:\Users\Admin\AppData\Local\Temp\49DC.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-03-07_fab759fb2fe3afe954768961dab742d2_mafia.exe 2688B1748F04B11C2BAA8CE38345CCD80678831428302BD311C8A794065F260F575A84E1434A7339D2ADC8F15E00F62A0A3F6F0640306FC4CC19F84409E61EF52⤵
- Deletes itself
- Executes dropped EXE
PID:2576
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
411KB
MD558c0550443d0d4d25a39e156e420e4f9
SHA1285caa722e3211ee7f435cdb7ce13ad9f83b8733
SHA2561283befd5cc733e9e731df73d5fad04fd35c5de5cbfb4935afe3746d225bece0
SHA512ef470086fb52b2c9c11fa45f52147b45b83a67449e85e0ea3d0b1bdd3f6c8bd353d1486821666043333012066dfce82b19c77073b6166b8b29c229e97dd1766f