Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 09:39
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-15_4460a63bf32a0d3b36bd982fc876ce36_mafia.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-15_4460a63bf32a0d3b36bd982fc876ce36_mafia.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-15_4460a63bf32a0d3b36bd982fc876ce36_mafia.exe
-
Size
411KB
-
MD5
4460a63bf32a0d3b36bd982fc876ce36
-
SHA1
d8beb5582e30fddac4cd1f71dfa7ace6dc828eea
-
SHA256
ff2d72dfba3f7111a3dbf6f2f55e82d0b5b2d24a679ff169c39159d8e3c95eed
-
SHA512
eda165f0ce807da279cbccbc31880165ab390c7173c80fe1270674e25c40447500ee299bdd408b8445f3f18a408179a8581546288919fd4e55aee4061e3939fe
-
SSDEEP
6144:gVdvczEb7GUOpYWhNVynE/mFwAJR0aUhaHPkDyxDhcpgum2qHI:gZLolhNVyEFAJOjegqD+pVqHI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2188 BC4.tmp -
Executes dropped EXE 1 IoCs
pid Process 2188 BC4.tmp -
Loads dropped DLL 1 IoCs
pid Process 2176 2024-04-15_4460a63bf32a0d3b36bd982fc876ce36_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2188 2176 2024-04-15_4460a63bf32a0d3b36bd982fc876ce36_mafia.exe 28 PID 2176 wrote to memory of 2188 2176 2024-04-15_4460a63bf32a0d3b36bd982fc876ce36_mafia.exe 28 PID 2176 wrote to memory of 2188 2176 2024-04-15_4460a63bf32a0d3b36bd982fc876ce36_mafia.exe 28 PID 2176 wrote to memory of 2188 2176 2024-04-15_4460a63bf32a0d3b36bd982fc876ce36_mafia.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_4460a63bf32a0d3b36bd982fc876ce36_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-15_4460a63bf32a0d3b36bd982fc876ce36_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\BC4.tmp"C:\Users\Admin\AppData\Local\Temp\BC4.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-04-15_4460a63bf32a0d3b36bd982fc876ce36_mafia.exe 1F00AF54CF05B227EDEE4AC10E367280E31705E81B96612E940E95487CD65DAEB6A55BBC8FAD5305830307FDF9B169966DF6EF9EF602E26F45BBF7B07FE993932⤵
- Deletes itself
- Executes dropped EXE
PID:2188
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
411KB
MD5b3747e1ded8d1cdf8fc26ba680ee9a75
SHA19a0043924759bad825d7835d62c65cec90d14ee3
SHA2561d5e30939da657f986a82caab8937f8390c354a27ff8470d139357538ea24019
SHA512322ee546ffdd528f2beff4b46bd355c7f1fa2ac2a212d8e8d250a2f66ff3cb85318073f134a6e17fa74b175474fac4f7996cbce0e9c90140f32884db900499ab