Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2024, 06:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-16_537acc277839012922669473db6bba66_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-16_537acc277839012922669473db6bba66_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-16_537acc277839012922669473db6bba66_mafia.exe
-
Size
476KB
-
MD5
537acc277839012922669473db6bba66
-
SHA1
2908f80ce308197e7678137b21c745d5c0177148
-
SHA256
a4df27d164d84bd29593c5d60a65eff4cea930a001558fb38f46eacf002178b1
-
SHA512
a89fda6d299fabdba70f477a8a1edd8a08f7e59616966655c6472bbf1c2356a2cc1e501f5a2fd6c866a1ab723e2f92b14ef7909981a53bdc67ee7113747989e5
-
SSDEEP
12288:aO4rfItL8HRoMLvv5vNgdzvJowP7K9wlsDpVFd:aO4rQtGR9LvvnsP+9wlsDpVFd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4760 6E3B.tmp -
Executes dropped EXE 1 IoCs
pid Process 4760 6E3B.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1400 wrote to memory of 4760 1400 2024-03-16_537acc277839012922669473db6bba66_mafia.exe 88 PID 1400 wrote to memory of 4760 1400 2024-03-16_537acc277839012922669473db6bba66_mafia.exe 88 PID 1400 wrote to memory of 4760 1400 2024-03-16_537acc277839012922669473db6bba66_mafia.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-16_537acc277839012922669473db6bba66_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-16_537acc277839012922669473db6bba66_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\6E3B.tmp"C:\Users\Admin\AppData\Local\Temp\6E3B.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-03-16_537acc277839012922669473db6bba66_mafia.exe 8150DA50AC21482FA5F4504B57A417966CF61F3D04E55F04C91B878CD386078F159F0D4303F7E0E2816FA2AA694F050D08FE61F3731297BF02037B3F21479F7D2⤵
- Deletes itself
- Executes dropped EXE
PID:4760
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
476KB
MD5daa566e4e018fa1b1555010c1cedcc00
SHA143cf92b25c51e8de59dde67a5284f2e75275462a
SHA256485150dc0e63c87589427f5ace0136a8ea6f34d33ead0094b27a44896ddcfb33
SHA51210fcf02940ea7870a65f262988391071cb0a06514e0f7f44e7445d9baba6742cab604ba9ce1a6eba9ecac1f6e54e898df523b3e040375c8d999d7c06e0d811e2