Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 16:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-27_e26f65a024896f3bbc6a4be2bbb5d66c_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-27_e26f65a024896f3bbc6a4be2bbb5d66c_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-27_e26f65a024896f3bbc6a4be2bbb5d66c_mafia.exe
-
Size
435KB
-
MD5
e26f65a024896f3bbc6a4be2bbb5d66c
-
SHA1
1e9f59afdd4d3ee1c11dbbd385af0873bc9e1382
-
SHA256
375dea4e4eb06b6eaad75490e52927fab2ab8f7009184196ea3d92859f113f16
-
SHA512
98e97c7a622586ceb4f6b9fa4f4c3048db0579662b17f3099feabd9eca68c8aaec5b573c43b298bece9131b9538b9dcbbc981b0e5da5c475c260452a1a30fc85
-
SSDEEP
12288:9W4ufepiqKQ1mVOW2k1Ei8neghcYqicxZoVJ:9W4ufepiqhmp1EDQ1u
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 220 3C8C.tmp -
Executes dropped EXE 1 IoCs
pid Process 220 3C8C.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2104 wrote to memory of 220 2104 2024-03-27_e26f65a024896f3bbc6a4be2bbb5d66c_mafia.exe 87 PID 2104 wrote to memory of 220 2104 2024-03-27_e26f65a024896f3bbc6a4be2bbb5d66c_mafia.exe 87 PID 2104 wrote to memory of 220 2104 2024-03-27_e26f65a024896f3bbc6a4be2bbb5d66c_mafia.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-27_e26f65a024896f3bbc6a4be2bbb5d66c_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-27_e26f65a024896f3bbc6a4be2bbb5d66c_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\3C8C.tmp"C:\Users\Admin\AppData\Local\Temp\3C8C.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-03-27_e26f65a024896f3bbc6a4be2bbb5d66c_mafia.exe 0D20E312568EA158A83042979AE5BC1595094B939EE0D983E418DF4DEF6FC14037940A126653C323AEF4937D7B7CCBB41FA9FDC428764B5F3F24F79195678B1E2⤵
- Deletes itself
- Executes dropped EXE
PID:220
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
435KB
MD5a10c9d90600599a2837391675e5461ce
SHA1f8757f64d510637dd06ffc1536037a75cf66e6c0
SHA256f9e86b8a80c4da1b4416fc07100b29d623df3d4e0d061b140fa3e26d1efc1d58
SHA512a01c557c33f3368869853a948504793ac7f12f81063366e52a75285a0f39e1753d6e49d196a741d4a8b367965dff8aa20a482bbc93711f456b3da197b8148ab6