Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 02:28
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-19_238dd41dbc540a5d586761385e815e95_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-19_238dd41dbc540a5d586761385e815e95_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-03-19_238dd41dbc540a5d586761385e815e95_mafia.exe
-
Size
443KB
-
MD5
238dd41dbc540a5d586761385e815e95
-
SHA1
b18529a84559201454250a942e0d02ed3bfd0fcb
-
SHA256
f95f4b3df036a55f6fe48abe6f719453d485b76c290d8fe54afb0db8e8360112
-
SHA512
913dd6f705d8934291e4f1b038495c47f360d103894d68c13bc188df119188a97a9c15c23ae0f2a00eec572ce5c4549a8acf3de05ab5de0cd650107cd056f49e
-
SSDEEP
6144:Wucyz4obQmKkWb6ekie+ogU6BYUfk7DO2FlMJq8GrcBs9K5p6z3TM0Y2RulMa:Wq4w/ekieZgU6Oa2fMJqNrsQapO6lMa
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 536 3894.tmp -
Executes dropped EXE 1 IoCs
pid Process 536 3894.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3724 wrote to memory of 536 3724 2024-03-19_238dd41dbc540a5d586761385e815e95_mafia.exe 85 PID 3724 wrote to memory of 536 3724 2024-03-19_238dd41dbc540a5d586761385e815e95_mafia.exe 85 PID 3724 wrote to memory of 536 3724 2024-03-19_238dd41dbc540a5d586761385e815e95_mafia.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_238dd41dbc540a5d586761385e815e95_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-19_238dd41dbc540a5d586761385e815e95_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\3894.tmp"C:\Users\Admin\AppData\Local\Temp\3894.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-03-19_238dd41dbc540a5d586761385e815e95_mafia.exe A8A09A84246E7D05805642238E239381FE3C26B45738D4B53AC0C5642F213EE5D915DE21C6A6B3EB87CAA926FB559A77741B2A4EFD02BB96BB0672909BCC4A252⤵
- Deletes itself
- Executes dropped EXE
PID:536
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
443KB
MD5c6f7f1e8e3b56e7c165dab1b11316b6b
SHA1a5c05a74df203acb38ce9aa1036388f4c9987c12
SHA2564a156625f62c1b5c2aec2db16601d81811711fc93702e796856e2a9fadc731cb
SHA51285d79f286173f8d13cae95eccf4cad57d891f608f10794696ce5f07ad580b39a75478f55acb2c9106d58f76c0529f1a033e402e157ec92ec67d2c3d610fc0c4d