Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2024, 15:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-16_d62395f62c59740f16de2c60d4d53be3_mafia.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-16_d62395f62c59740f16de2c60d4d53be3_mafia.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-16_d62395f62c59740f16de2c60d4d53be3_mafia.exe
-
Size
448KB
-
MD5
d62395f62c59740f16de2c60d4d53be3
-
SHA1
faf420707eb8580ddc4e6a6bf4622fe1125f198d
-
SHA256
75d9a2ff8999a542d182dc31ce7d74b9f45739e47acb7ee6b27ef5ea8634c748
-
SHA512
243c12b75b39b47153b7fc078cac34d7ef3acc2897d70e2b0f1615b4982e95b6336ebf333a688fdd64b85a2227bac45eff784a7e5ce1d0d6ab612ff78082a35c
-
SSDEEP
6144:3FrJxvldL4c5ONK1tgRbd1s79+i5+Ls4uzLN0EZqtEiK2diPLhV8/FaSNADmX0q:lb4bBxdi79L4s4umEZXiKjsyDmXJ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 360 64D4.tmp -
Executes dropped EXE 1 IoCs
pid Process 360 64D4.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2948 wrote to memory of 360 2948 2024-04-16_d62395f62c59740f16de2c60d4d53be3_mafia.exe 87 PID 2948 wrote to memory of 360 2948 2024-04-16_d62395f62c59740f16de2c60d4d53be3_mafia.exe 87 PID 2948 wrote to memory of 360 2948 2024-04-16_d62395f62c59740f16de2c60d4d53be3_mafia.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_d62395f62c59740f16de2c60d4d53be3_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-16_d62395f62c59740f16de2c60d4d53be3_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\64D4.tmp"C:\Users\Admin\AppData\Local\Temp\64D4.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-04-16_d62395f62c59740f16de2c60d4d53be3_mafia.exe 552861B2FB94B543DA76EA9A286C83D60C14D2508A82DC11B743E7ACA514FC7F5D8B4E7ED61A44B6E1341190EF04F85C01804D81FF2280032EFE762290A2D7422⤵
- Deletes itself
- Executes dropped EXE
PID:360
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
448KB
MD588e86f6bb1177c8aa82b3650c3ea7a2a
SHA19015ca7a0978643ee391595ca84c3b814fbae9f5
SHA256e91b86cebe73a174a7221645ca397b9424c5b4b67939da4a930f4ecdac8c33df
SHA512834ee794d13a1d8c8780bf96ccfc98407179f9a7fe71edd149293de6200f423b2b06697a991b0a96edee7e5a57f59bd3c7056b1da31bded6b0a1a35b98582587