Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18/03/2024, 10:33
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-18_5aa048764b7dffe3c077b50252cb8ba1_mafia.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-03-18_5aa048764b7dffe3c077b50252cb8ba1_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-18_5aa048764b7dffe3c077b50252cb8ba1_mafia.exe
-
Size
412KB
-
MD5
5aa048764b7dffe3c077b50252cb8ba1
-
SHA1
c18d55af37c8822f48b1cc02b3305ac7317dd41b
-
SHA256
2f727157aa53e21afd5fabfd7a0b37bcdcfbc89ee0904b7acc2f417b26397f99
-
SHA512
f50f3038bfa012abab0f79c56ce49b30bba61cd0e9237979c66304df430ff3222d0d1d0176331482db4ccb7fa571e5f3dbf5d41dd246fd07f4ba7b002b3449cd
-
SSDEEP
12288:U6PCrIc9kph50ZONjqjBfGYSjNYX8wgHm:U6QIcOh56fjBeY4ux
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1944 76D6.tmp -
Executes dropped EXE 1 IoCs
pid Process 1944 76D6.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1084 wrote to memory of 1944 1084 2024-03-18_5aa048764b7dffe3c077b50252cb8ba1_mafia.exe 87 PID 1084 wrote to memory of 1944 1084 2024-03-18_5aa048764b7dffe3c077b50252cb8ba1_mafia.exe 87 PID 1084 wrote to memory of 1944 1084 2024-03-18_5aa048764b7dffe3c077b50252cb8ba1_mafia.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-18_5aa048764b7dffe3c077b50252cb8ba1_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-18_5aa048764b7dffe3c077b50252cb8ba1_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\76D6.tmp"C:\Users\Admin\AppData\Local\Temp\76D6.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-03-18_5aa048764b7dffe3c077b50252cb8ba1_mafia.exe 88D4040E95C9C3F6673D0EA696193CD546CC020CFB6D3A5988089101EF0B50A11481E508C1FF16687B28D4835CB601304BD9EE175928C87260965DD99F3F0B292⤵
- Deletes itself
- Executes dropped EXE
PID:1944
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD5d56afa8a034e225d6125209cf8bfebd2
SHA176839a18ff47ff59635fd6af85aa7edc0f2e22de
SHA2568a3f1ab7fe5d9ba0fbe0167f993175be050727850b6e7d9d98d8ec59107b3b15
SHA5123134345329d917b0cb140f6731cecb1a41ec4864c8e2805207f25a580da1a3832925190965e1840f3138e823e004b8f70d5894c116f9479d32563a6ae60e0491