Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/04/2024, 11:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-08_ce653233db44f35f8acb0714a7dd6066_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-08_ce653233db44f35f8acb0714a7dd6066_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-08_ce653233db44f35f8acb0714a7dd6066_mafia.exe
-
Size
486KB
-
MD5
ce653233db44f35f8acb0714a7dd6066
-
SHA1
e2f409c7a2d5caab782be13811a9be457471ff6c
-
SHA256
b0c794bfcaf7e13cece24656d0575c609b7b34ec6bc551bb1898c21ab848476d
-
SHA512
d33300d11069baea23036126e1332c7fdb3019bd399cbbfb33ccdd5e7f80de565708aa17a65ec5ba1a8a49e00bd8353e3b189754e62139778d36497c7559486f
-
SSDEEP
12288:3O4rfItL8HPTAuP0EpwehrVwEnqdd67rKxUYXhW:3O4rQtGP0cpX9+d63KxUYXhW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2408 4E8D.tmp -
Executes dropped EXE 1 IoCs
pid Process 2408 4E8D.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4220 wrote to memory of 2408 4220 2024-04-08_ce653233db44f35f8acb0714a7dd6066_mafia.exe 85 PID 4220 wrote to memory of 2408 4220 2024-04-08_ce653233db44f35f8acb0714a7dd6066_mafia.exe 85 PID 4220 wrote to memory of 2408 4220 2024-04-08_ce653233db44f35f8acb0714a7dd6066_mafia.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-08_ce653233db44f35f8acb0714a7dd6066_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-08_ce653233db44f35f8acb0714a7dd6066_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\4E8D.tmp"C:\Users\Admin\AppData\Local\Temp\4E8D.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-04-08_ce653233db44f35f8acb0714a7dd6066_mafia.exe 5549579C48E2DEBD28A92FA3D06A2AFDF7854DB74E37CE443F7E35E163B67A341CEA9240CD897BB7C8EC67CD0AACA44F43750E990989E8DAB4A2DC6EECCE96062⤵
- Deletes itself
- Executes dropped EXE
PID:2408
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
486KB
MD57d76403ec674bea8c413017ca0b1b883
SHA1c8a3730093bc9dcc840ee06cf655f0e78e06b269
SHA256dfde675fca4ceaf77349f796c4de4b59f8f47d30b95d613c2aba6b6708f29623
SHA51260540247486aad67116b300eae4b1cb910d2fcf706dd6a759f57ddd6644fd2c1b13b3c805e9111ae4ff460e4da0dd330a142853be226245fe02d7cd947850020