Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/04/2024, 22:30
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-05_8a3f011585dad9e303d7f15868441acd_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-05_8a3f011585dad9e303d7f15868441acd_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-05_8a3f011585dad9e303d7f15868441acd_mafia.exe
-
Size
433KB
-
MD5
8a3f011585dad9e303d7f15868441acd
-
SHA1
bacdccb105e1ff7de953f1adf0242bc9f4122b57
-
SHA256
465fdfd76fa310a183dad381a24cc9bccf5506108fce93e08bf08d189fa1d2b5
-
SHA512
2f77dab5ca8aa4a0a7b479ef78fb071012ea76e8d7e743fcb3399e5266795e1144debdd82bbd0cb375430ec5d8bc405601c2058ca3d6b0308c8f7665ff9c437d
-
SSDEEP
6144:Cajdz4sTdDyyqiOXpOd0p6Jiv+vtvfSBE6s5YODIl/hiy8n7MXa515/OH6gn/+5N:Ci4g+yU+0pAiv+1SBE6eDlM65xgnB0n
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2212 4894.tmp -
Executes dropped EXE 1 IoCs
pid Process 2212 4894.tmp -
Loads dropped DLL 1 IoCs
pid Process 2216 2024-04-05_8a3f011585dad9e303d7f15868441acd_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2212 2216 2024-04-05_8a3f011585dad9e303d7f15868441acd_mafia.exe 28 PID 2216 wrote to memory of 2212 2216 2024-04-05_8a3f011585dad9e303d7f15868441acd_mafia.exe 28 PID 2216 wrote to memory of 2212 2216 2024-04-05_8a3f011585dad9e303d7f15868441acd_mafia.exe 28 PID 2216 wrote to memory of 2212 2216 2024-04-05_8a3f011585dad9e303d7f15868441acd_mafia.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-05_8a3f011585dad9e303d7f15868441acd_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-05_8a3f011585dad9e303d7f15868441acd_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\4894.tmp"C:\Users\Admin\AppData\Local\Temp\4894.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-04-05_8a3f011585dad9e303d7f15868441acd_mafia.exe F30AA6C6F868E344CE4DAA208AA32091F6274B4590C067C0E4BF5D520F1703FEEE041426209E33A10BCC5AEB0AD5B56CC38173FC476E3E866512B6EF398936B32⤵
- Deletes itself
- Executes dropped EXE
PID:2212
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
433KB
MD5bebd096ab98440807a2edd02f5a7773e
SHA1b6afb90c430d7ca3cac048c158490e63012e2a5a
SHA256481eca056b498b59804eac46c73db5602e62b1467792fd4e268f428785329710
SHA51279003c0ac49e0483c9d14575a5e3d971e9291cd98b756296edb9f0ccea78271d17a279028f247001f0f7667df5218a72746449f4e02555401a5674a631583821