Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
160s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2024, 06:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-16_574d3b22763903f1ea6bb36d4b005a66_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-16_574d3b22763903f1ea6bb36d4b005a66_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-16_574d3b22763903f1ea6bb36d4b005a66_mafia.exe
-
Size
476KB
-
MD5
574d3b22763903f1ea6bb36d4b005a66
-
SHA1
dea1a30816ab9a1ebaa3a9c9d057582b3579ca45
-
SHA256
a33f200b5bf5a972f3878ade987e98b76675e9a1ddd6e4948467cb305ae7332a
-
SHA512
0a1d709f913fd2bad9f87992bc6f8542bf75a5a564f5d0eaf46486623bbfd9bff14aa3c6aa565ed29e5c5c39a7359eddd05f1f68c34a087bd8f44c97e0bf7e7a
-
SSDEEP
12288:aO4rfItL8HR+sRc9XWUjAoyTo2GphPxwloSO7K9wlsDpVFd:aO4rQtGR+siFWU8LE2GpjEE+9wlsDpVT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3460 27A7.tmp -
Executes dropped EXE 1 IoCs
pid Process 3460 27A7.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2872 wrote to memory of 3460 2872 2024-03-16_574d3b22763903f1ea6bb36d4b005a66_mafia.exe 101 PID 2872 wrote to memory of 3460 2872 2024-03-16_574d3b22763903f1ea6bb36d4b005a66_mafia.exe 101 PID 2872 wrote to memory of 3460 2872 2024-03-16_574d3b22763903f1ea6bb36d4b005a66_mafia.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-16_574d3b22763903f1ea6bb36d4b005a66_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-16_574d3b22763903f1ea6bb36d4b005a66_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\27A7.tmp"C:\Users\Admin\AppData\Local\Temp\27A7.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-03-16_574d3b22763903f1ea6bb36d4b005a66_mafia.exe A384466BF63040355A23A508F565F618FDBA4081DDE10E6F12E0017618188344E781FC35E3DAB684521438EEF76CB9DABFE40107C08C2295D6265B11EAC25B052⤵
- Deletes itself
- Executes dropped EXE
PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4076 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:81⤵PID:3900
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
476KB
MD532e45c8e4141c549f5b6a5635351064c
SHA1ef7ca6d411b44c71fedb68b22d353fbab42b02e1
SHA256e291de7c1ca971cd8cc232fa8732dcfc2e55b1396b31987e748f3c322544425a
SHA51266fc40d8c2792bd3e49b6a143ca3b684ebc8b8ea259d6e9855a6daf56af785002fc6e1bf9f7856ec382a925018d9f7b1ebcd4fe13622d287e0d6c10ddd9fd986