Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2024, 13:39
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-25_7c2bd2c962cc0e7bc6a75a64b900928e_mafia.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
2024-03-25_7c2bd2c962cc0e7bc6a75a64b900928e_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-25_7c2bd2c962cc0e7bc6a75a64b900928e_mafia.exe
-
Size
486KB
-
MD5
7c2bd2c962cc0e7bc6a75a64b900928e
-
SHA1
a42687f3f0abe55fbce55b88bff87fe4cb654972
-
SHA256
b19b62d72b9cf8f8569eeb1d97e57b6da1a4578febdf14ceb7017dff6abb5df9
-
SHA512
d93672d99539f04da8721a18b7d330610f429759b16ec2e69ec23c7481e81db44dfe1e04cf6cacd879ddcbb6f28054dfcdb138839da5957172820d890b067f9f
-
SSDEEP
12288:3O4rfItL8HPo8SQJOZf/Q7qjbIUd/fpPhI7rKxUYXhW:3O4rQtGPBSQJqQOjbP7I3KxUYXhW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3292 43CF.tmp -
Executes dropped EXE 1 IoCs
pid Process 3292 43CF.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 448 wrote to memory of 3292 448 2024-03-25_7c2bd2c962cc0e7bc6a75a64b900928e_mafia.exe 89 PID 448 wrote to memory of 3292 448 2024-03-25_7c2bd2c962cc0e7bc6a75a64b900928e_mafia.exe 89 PID 448 wrote to memory of 3292 448 2024-03-25_7c2bd2c962cc0e7bc6a75a64b900928e_mafia.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-25_7c2bd2c962cc0e7bc6a75a64b900928e_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-25_7c2bd2c962cc0e7bc6a75a64b900928e_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Users\Admin\AppData\Local\Temp\43CF.tmp"C:\Users\Admin\AppData\Local\Temp\43CF.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-03-25_7c2bd2c962cc0e7bc6a75a64b900928e_mafia.exe F032121325CD4BE501CB2C2C9806F0341EF63BF3B00C10393DC8B934026DFAFA8D3AA6537E3577216C288615248479D53BA185D9CB3BFC3954138FA62C0DE9982⤵
- Deletes itself
- Executes dropped EXE
PID:3292
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
486KB
MD59abdff590baa018bcef7813b8c714936
SHA13971b9bff290f7d1a2e24a7a0a7aa143c22d4476
SHA2565397b68668db83de3aaa4438a2bf3c7d0a71cf64fe8d9290e4a47b552bd909ce
SHA512f23c7f1ae060d495d6ae503619e58d04fbb0c728f4ec151988bdd85790be1fb44b978861dc310ee55003ed3d03c1ee634a5d28bf694b012d1f3ab0bee952cfa2