Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2024, 22:35
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-26_8a068197040d28d849eec169851dd08d_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-26_8a068197040d28d849eec169851dd08d_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-03-26_8a068197040d28d849eec169851dd08d_mafia.exe
-
Size
476KB
-
MD5
8a068197040d28d849eec169851dd08d
-
SHA1
d93169b75d32070ce0e9dfaab1055239506b7f70
-
SHA256
ae135e7ae0084db0f416cc94d152c124d1d6c7618d02883199414851cafbf137
-
SHA512
96523268b91a39e69ed2bca9e93cd87beb2d1a88e3ff8f45dba1776ef726cb57c97723e0067793e52c23d77c1077dea51394266a448d4fc9393301419771e9ea
-
SSDEEP
12288:aO4rfItL8HRPdgI+W1yWsL0YOHraFHy6tj1FmYFM7K9wlsDpVFd:aO4rQtGRt+W9sQra1FmYM+9wlsDpVFd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4608 50B0.tmp -
Executes dropped EXE 1 IoCs
pid Process 4608 50B0.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3680 wrote to memory of 4608 3680 2024-03-26_8a068197040d28d849eec169851dd08d_mafia.exe 85 PID 3680 wrote to memory of 4608 3680 2024-03-26_8a068197040d28d849eec169851dd08d_mafia.exe 85 PID 3680 wrote to memory of 4608 3680 2024-03-26_8a068197040d28d849eec169851dd08d_mafia.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-26_8a068197040d28d849eec169851dd08d_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-26_8a068197040d28d849eec169851dd08d_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\50B0.tmp"C:\Users\Admin\AppData\Local\Temp\50B0.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-03-26_8a068197040d28d849eec169851dd08d_mafia.exe 103D6982C4A3A1CA094F410969BD360DF8A800D67ED45694953DA5CD7FF1D515AE9C8B52C531E178DBE0A70B80F6D68B9E54848317700606B1765346827D83002⤵
- Deletes itself
- Executes dropped EXE
PID:4608
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
476KB
MD5fb6a3987aa85d241a29a3196f6685f86
SHA1ec6de93ef62822455b2c85d0bb4e1f5c6849481a
SHA2564f99bcbbba7900893a002db165edbdca5b6035c857d2ca5258a4ad642f507e6e
SHA5124351176d9b9f973612e519c8519cc5fa7767a58ceb8845cf7ed80b5af92000938c768551abde022d7e884e13c2e3ab65884835efe1bdb040ffa3e965b4782a41