Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 21:29
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-14_3d4ea782bee45dbb1c655f3b7567f577_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-14_3d4ea782bee45dbb1c655f3b7567f577_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-14_3d4ea782bee45dbb1c655f3b7567f577_mafia.exe
-
Size
443KB
-
MD5
3d4ea782bee45dbb1c655f3b7567f577
-
SHA1
00035fe60586b88e30956561b250b841582b53e8
-
SHA256
f6d547c64926abbb491230b0a8ebfb43d2c9f42f8413f0297654f7b4b03fa1c9
-
SHA512
1d39da3d0abefb1f85745ff8bfafb515900ad90335e7f8e510c39ca41d52b78c552e057ea3b4476275e2bdf070c29d958d12997dff7fdc147bd39bf71d845172
-
SSDEEP
6144:Wucyz4obQmKkWb6ekie+ogU6BYAnCo8AAbZhrNhZQcYXPBkwq9ONCEQ+PcrqlMa:Wq4w/ekieZgU6rnf8lvrb5Y/BqlrqlMa
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2952 5A40.tmp -
Executes dropped EXE 1 IoCs
pid Process 2952 5A40.tmp -
Loads dropped DLL 1 IoCs
pid Process 2360 2024-03-14_3d4ea782bee45dbb1c655f3b7567f577_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2952 2360 2024-03-14_3d4ea782bee45dbb1c655f3b7567f577_mafia.exe 28 PID 2360 wrote to memory of 2952 2360 2024-03-14_3d4ea782bee45dbb1c655f3b7567f577_mafia.exe 28 PID 2360 wrote to memory of 2952 2360 2024-03-14_3d4ea782bee45dbb1c655f3b7567f577_mafia.exe 28 PID 2360 wrote to memory of 2952 2360 2024-03-14_3d4ea782bee45dbb1c655f3b7567f577_mafia.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-14_3d4ea782bee45dbb1c655f3b7567f577_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-14_3d4ea782bee45dbb1c655f3b7567f577_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\5A40.tmp"C:\Users\Admin\AppData\Local\Temp\5A40.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-03-14_3d4ea782bee45dbb1c655f3b7567f577_mafia.exe 6E7AE010196DFD1E6FD0CB1776CCF38CCE83FFE8744B562265745F62F4509C4E9A27C41486312026D245FDFB5C8D493C7D801C8413A9761FC00342C3D2EA62B72⤵
- Deletes itself
- Executes dropped EXE
PID:2952
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
443KB
MD56054cd4be6eeedb3f0b51c8c709810fe
SHA152635a882852c057bffed3063b0f54d8a58f8b7f
SHA256da20acde701e2b83bae752c8c1a5e57e8bb128b45d29b951090b3fc14c71eb8d
SHA5127e1d2f5f6c224dc0817e43c35f527d3ad22dc0e2a1d9d955b4eba7b3c1b1c7b463fe950e6cb1698ff51ad262e558929c8074384030cf102e4ba7fe2064ac9e1e