Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 17:33
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-15_591e194c97288cfce8fa4ddeec55f175_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-03-15_591e194c97288cfce8fa4ddeec55f175_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-15_591e194c97288cfce8fa4ddeec55f175_mafia.exe
-
Size
486KB
-
MD5
591e194c97288cfce8fa4ddeec55f175
-
SHA1
b21166abb835010eb3cd88c5f45cf334b5dd1078
-
SHA256
a30bdcef16d0947f539bb4d7aa442f85f16c4d3b585d3cba2ace5c3ec4753f19
-
SHA512
c0cca3ebf1cfd7baddb5faeac1ebc6d4ee3ae309e143fc0dd0317fa5dc0f1185132df0a9a45f816ba47a3eb2be91905890503119096a700bd2c8d37710dbc3c8
-
SSDEEP
12288:3O4rfItL8HPEb8Sn8UmSP/91b5qwR7rKxUYXhW:3O4rQtGP28WN1tq63KxUYXhW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3168 EB1.tmp -
Executes dropped EXE 1 IoCs
pid Process 3168 EB1.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4160 wrote to memory of 3168 4160 2024-03-15_591e194c97288cfce8fa4ddeec55f175_mafia.exe 97 PID 4160 wrote to memory of 3168 4160 2024-03-15_591e194c97288cfce8fa4ddeec55f175_mafia.exe 97 PID 4160 wrote to memory of 3168 4160 2024-03-15_591e194c97288cfce8fa4ddeec55f175_mafia.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-15_591e194c97288cfce8fa4ddeec55f175_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-15_591e194c97288cfce8fa4ddeec55f175_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\EB1.tmp"C:\Users\Admin\AppData\Local\Temp\EB1.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-03-15_591e194c97288cfce8fa4ddeec55f175_mafia.exe 09F2A1EC1C5F64D7754825258BD8B48AF8901049A632FA3AC1ED667353A518A6102294FAD629FC4DBAE2640926DD6076BC7A3129CDE534071027E6ABFEF5B4C72⤵
- Deletes itself
- Executes dropped EXE
PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3608 --field-trial-handle=2284,i,9807419199535700662,2319175108930815708,262144 --variations-seed-version /prefetch:81⤵PID:5080
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
486KB
MD5344f07a08fd759c4c94aeb58c2645c99
SHA135e2f8a8a2dc305b5ec38be39b6c597f946900a5
SHA2569d0e9fd97d0ea70dc8fbeefd9d936394883c4052a675b749724108cef077de8a
SHA51225a71526b936e56b9132d90f5f04f9e4709bfc636038ee61c8bde27c9a30d32db2f151cb53576dc712af5a56dad54af88cf5b29530551d3e44c9ec8fe8f49913