Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
16/04/2024, 04:57
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-16_8e2f862feacc19df5824a98dbdc31e95_mafia.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-04-16_8e2f862feacc19df5824a98dbdc31e95_mafia.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-16_8e2f862feacc19df5824a98dbdc31e95_mafia.exe
-
Size
412KB
-
MD5
8e2f862feacc19df5824a98dbdc31e95
-
SHA1
cd8832a23db93b044638899b625450c57562d77c
-
SHA256
3157599de3414c0a9b2d0fb380bc326a3b7b97d2ee6f2ccf9fb58ec90a2491ce
-
SHA512
5ca1d81dfbbba3e11354dd93b957dfe3969b32523fab920d41e468dd8658e27b98f7b39d9a7a877ebaf5a8ce819041f45d06cddff558ea11f4934cc60abe6535
-
SSDEEP
6144:UooTAQjKG3wDGAeIc9kphIoDZn71DjUN5zreUfsKMKoor7gIOrBSluRP:U6PCrIc9kph5TjUb/eUfzf75dlo
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2220 118E.tmp -
Executes dropped EXE 1 IoCs
pid Process 2220 118E.tmp -
Loads dropped DLL 1 IoCs
pid Process 1304 2024-04-16_8e2f862feacc19df5824a98dbdc31e95_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1304 wrote to memory of 2220 1304 2024-04-16_8e2f862feacc19df5824a98dbdc31e95_mafia.exe 28 PID 1304 wrote to memory of 2220 1304 2024-04-16_8e2f862feacc19df5824a98dbdc31e95_mafia.exe 28 PID 1304 wrote to memory of 2220 1304 2024-04-16_8e2f862feacc19df5824a98dbdc31e95_mafia.exe 28 PID 1304 wrote to memory of 2220 1304 2024-04-16_8e2f862feacc19df5824a98dbdc31e95_mafia.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_8e2f862feacc19df5824a98dbdc31e95_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-16_8e2f862feacc19df5824a98dbdc31e95_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\118E.tmp"C:\Users\Admin\AppData\Local\Temp\118E.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-04-16_8e2f862feacc19df5824a98dbdc31e95_mafia.exe 6EFAED0AC36AFD890808D45FED9499E74966BDB43BBECCB9903EC4C5FBAF33B0BE4E7F96C8E802019D3959E891441867CE0225083BADE4D755B7C728D1C5F2F82⤵
- Deletes itself
- Executes dropped EXE
PID:2220
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD5dde15bddaa9c686d98c2a683fd06dd0c
SHA13acd0cfc5faa2f1676fb0e50cc0731ad953232f9
SHA256e7fae1c46837d6c28bf0ed51a347505e34dca5cda3b89428b2851abf2ed6c07b
SHA5121d7ad97a8da9e5028e9b0cc04ccea602a7a983eb9a43b1992ad29ea66de2cc86d47a9aa2b2bc7300fe714efd706be7cd0c06c57ee75e847036e143bd031af9d2