Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 03:50
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-12_d27d6d9f5e99abf6ba17820dc4c32325_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-12_d27d6d9f5e99abf6ba17820dc4c32325_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-12_d27d6d9f5e99abf6ba17820dc4c32325_mafia.exe
-
Size
414KB
-
MD5
d27d6d9f5e99abf6ba17820dc4c32325
-
SHA1
b0d32968278f4fa157ce1c219278e42067b6dc32
-
SHA256
27f9b76e4c75b5e6452c81f47757da4990cb98d5386394e55104fd099e909d1f
-
SHA512
2cb311e8e693dbf3d51e325493f88d62c4ee5058e60fc391126fa9844665a5166588575e9a2f2d78de16e8e42cd35bb426ddf810a36f01fd4502f20dacb497b8
-
SSDEEP
6144:Wucyz4obQmKkWb6ekie+ogU6BYQXqYvtWQ9vZ2Ru4XsMg1SwMdKogsgvw1KRSl:Wq4w/ekieZgU6bXRtV9v4IInwwgiNl
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1412 55C1.tmp -
Executes dropped EXE 1 IoCs
pid Process 1412 55C1.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1348 wrote to memory of 1412 1348 2024-03-12_d27d6d9f5e99abf6ba17820dc4c32325_mafia.exe 93 PID 1348 wrote to memory of 1412 1348 2024-03-12_d27d6d9f5e99abf6ba17820dc4c32325_mafia.exe 93 PID 1348 wrote to memory of 1412 1348 2024-03-12_d27d6d9f5e99abf6ba17820dc4c32325_mafia.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-12_d27d6d9f5e99abf6ba17820dc4c32325_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-12_d27d6d9f5e99abf6ba17820dc4c32325_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\55C1.tmp"C:\Users\Admin\AppData\Local\Temp\55C1.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-03-12_d27d6d9f5e99abf6ba17820dc4c32325_mafia.exe 3F982C5D7030726558DF79B0A7967175A4B95EDF9D963AB6DD844C4854D135B42E3404C428B45239D1843084EA0B2A07A51A94E5CFA93EF42B815B586AD9F9132⤵
- Deletes itself
- Executes dropped EXE
PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3520 --field-trial-handle=2284,i,2771196087253062161,8107167670425198948,262144 --variations-seed-version /prefetch:81⤵PID:2688
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
414KB
MD53d798e66a23ea64fdd494d59dbfd9080
SHA141f164438e07cfcb1244e1005e6400794043b295
SHA256cc9d534e00c87888d1fbec084fdcb3f4f0a18d1a9971877ea4eacaddb310cae8
SHA512208399e30f36c24f9923452ddb1698cff4c1df68e1df80692d06e2eb77610e2b1429d04f35be00716f5868d2fd2c291ef0a188bdf49c06c7b9f99e92a2979942