Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/03/2024, 05:35
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-26_5723b3d84846c56e93969c4f2dcc1e08_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-26_5723b3d84846c56e93969c4f2dcc1e08_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-26_5723b3d84846c56e93969c4f2dcc1e08_mafia.exe
-
Size
428KB
-
MD5
5723b3d84846c56e93969c4f2dcc1e08
-
SHA1
634f264247e8724d031ee0542a9b02dd452ff353
-
SHA256
44371882aa213bd06c376c34fec4434f0ce494022002b96d75a0e62e5ae33f1f
-
SHA512
921279c9cb1b34b1c5cfc43dcb2b886c3e58b3d029a5317fa5c8f3d682a79916c7f6b2b471d2a02a67e56de9700349e8f31728460cf38bf1445892ef4ec48fa6
-
SSDEEP
6144:gVdvczEb7GUOpYWhNVynE/mFBeRcAkCuUO+1CxsZ6ISkN0bTSrj4qHR:gZLolhNVyErcsuXICxsSkuAj4qHR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2304 4CD8.tmp -
Executes dropped EXE 1 IoCs
pid Process 2304 4CD8.tmp -
Loads dropped DLL 1 IoCs
pid Process 2352 2024-03-26_5723b3d84846c56e93969c4f2dcc1e08_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2304 2352 2024-03-26_5723b3d84846c56e93969c4f2dcc1e08_mafia.exe 28 PID 2352 wrote to memory of 2304 2352 2024-03-26_5723b3d84846c56e93969c4f2dcc1e08_mafia.exe 28 PID 2352 wrote to memory of 2304 2352 2024-03-26_5723b3d84846c56e93969c4f2dcc1e08_mafia.exe 28 PID 2352 wrote to memory of 2304 2352 2024-03-26_5723b3d84846c56e93969c4f2dcc1e08_mafia.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-26_5723b3d84846c56e93969c4f2dcc1e08_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-26_5723b3d84846c56e93969c4f2dcc1e08_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\4CD8.tmp"C:\Users\Admin\AppData\Local\Temp\4CD8.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-03-26_5723b3d84846c56e93969c4f2dcc1e08_mafia.exe C1BC362100C6F1DF7A580F12A7F3E7C04C7110451199AEE5073983D313DFBF98E1D1F037D0F3BF4CF48D78F6599F057AB75E629BAF8DEFB4DFEC5607ED027D382⤵
- Deletes itself
- Executes dropped EXE
PID:2304
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
428KB
MD5e770abbe81347041d1b596da88613e24
SHA1b410f1201c6bf506b89e42144ea904d87f1072d7
SHA25631876439e0acf238222d7db36df98cb6ebca275dd0f34b75b14f0a6551967ff0
SHA512499aada7e432ce0a5a7b55eaee0a4b139c2780fcf63f8dd2e5bd5379353239680afce02cd0aa1fbecbfcca23f394aeb2fd79d066e6bf95fed9bc0237104edb94