Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20/03/2024, 00:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-20_080b3171c84f7b6ea7dbcf49be24cb3f_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-20_080b3171c84f7b6ea7dbcf49be24cb3f_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-20_080b3171c84f7b6ea7dbcf49be24cb3f_mafia.exe
-
Size
468KB
-
MD5
080b3171c84f7b6ea7dbcf49be24cb3f
-
SHA1
f610ebefa6ad55bd1b1b7a80f97c54f952d35753
-
SHA256
f500e75de3c29b18cfab8ed2908e17b4c30daf2ac297217737a5b8889e7d49ad
-
SHA512
a67fef17a74b777bcd3cf66ca39f21ee97025d46097edf0e6efb21db47102baa1faf59dab9ab6cd1fd5935f4ad3aa00d034cc834cfd428e06289bf4fa432950f
-
SSDEEP
12288:qO4rfItL8HGhheoG44hONfXVY+AqKnCVw7bWmeEVGL:qO4rQtGGZGRhO1Xh7GumeEVGL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4716 CA45.tmp -
Executes dropped EXE 1 IoCs
pid Process 4716 CA45.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1848 wrote to memory of 4716 1848 2024-03-20_080b3171c84f7b6ea7dbcf49be24cb3f_mafia.exe 88 PID 1848 wrote to memory of 4716 1848 2024-03-20_080b3171c84f7b6ea7dbcf49be24cb3f_mafia.exe 88 PID 1848 wrote to memory of 4716 1848 2024-03-20_080b3171c84f7b6ea7dbcf49be24cb3f_mafia.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-20_080b3171c84f7b6ea7dbcf49be24cb3f_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-20_080b3171c84f7b6ea7dbcf49be24cb3f_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\CA45.tmp"C:\Users\Admin\AppData\Local\Temp\CA45.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-03-20_080b3171c84f7b6ea7dbcf49be24cb3f_mafia.exe 5EE340822820E37D6CFE38A899924CB118CD46F58E85D922718614F153AF0EE6191A6663B2E8BD34314E2639B82E8B6892EF01278F8C7B8EEB21B0224B20FE652⤵
- Deletes itself
- Executes dropped EXE
PID:4716
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
468KB
MD5d034eee6c638b4cd25813467ccb2dc2c
SHA1b3f6d4442335c791741454e85065f729fc53094b
SHA256b73641d7193de7190cf8068183201c6ffdacb6b04305cb4d8393b2fdfdacdd30
SHA512916a055e78e0057471b91efe94e0d65c72b81b5dbfdbdcaf5d6bc6873ab4f371cc1c668fbede8afe55ecc5f7a4850e274c706e3032f833f8864002f4018fcef6