Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2024, 01:41
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-06_9f28677ce9777597f0b5e4b785b24346_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-06_9f28677ce9777597f0b5e4b785b24346_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-06_9f28677ce9777597f0b5e4b785b24346_mafia.exe
-
Size
448KB
-
MD5
9f28677ce9777597f0b5e4b785b24346
-
SHA1
0349ad0b0200e5a2fc35849131617dae8b58e4a1
-
SHA256
6fd3d7d2d84865948687ce7f0f2e5471dd1f5f4fb32dc8465a6690a3005d8bed
-
SHA512
4f71e3a68a5d5879c8a99a45cb8bd5f8a38b958ffde901072c5cdbcb15486b3184b3868f35d996bebbea21430d1132f1d2d74598e5f3ed86f27db1336371c004
-
SSDEEP
12288:lb4bBxdi79LxfYYczgcCO7rPlYEUik39haw3tHu:lb4b7dkLI/7rPlYUEaQtHu
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2068 51D9.tmp -
Executes dropped EXE 1 IoCs
pid Process 2068 51D9.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 696 wrote to memory of 2068 696 2024-04-06_9f28677ce9777597f0b5e4b785b24346_mafia.exe 86 PID 696 wrote to memory of 2068 696 2024-04-06_9f28677ce9777597f0b5e4b785b24346_mafia.exe 86 PID 696 wrote to memory of 2068 696 2024-04-06_9f28677ce9777597f0b5e4b785b24346_mafia.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-06_9f28677ce9777597f0b5e4b785b24346_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-06_9f28677ce9777597f0b5e4b785b24346_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Users\Admin\AppData\Local\Temp\51D9.tmp"C:\Users\Admin\AppData\Local\Temp\51D9.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-04-06_9f28677ce9777597f0b5e4b785b24346_mafia.exe ACFB39EAD6CD8885C99E04649554CE7053D552F86CDB7D95AFA7AF2D53EAC145C51CEF21C0C277DFC4451B467F18E54C929DB756EC5631AA37E3081617A7C8C12⤵
- Deletes itself
- Executes dropped EXE
PID:2068
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
448KB
MD559cebf153184c90e070644aa721eea10
SHA1ced6a112d4b9f6e2b5831043d4cbed2486bbffac
SHA2563b13ed143c1c8d030c8c86cf51ebd123d8e1942a195a077925d8fb589d89d11d
SHA512949d2d3d7e570eb2ac42782abb9f856e5f9a0a10ad9e2412aef218d12f1f8fbfd6bd6e26c15e660f9889025ea117dcfc2aec2f48a27dd0ecc9b28e35d36b24a6