Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 13:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-17_14d8c900ec33aee016a8c0877e0f1577_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-17_14d8c900ec33aee016a8c0877e0f1577_mafia.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-17_14d8c900ec33aee016a8c0877e0f1577_mafia.exe
-
Size
2.4MB
-
MD5
14d8c900ec33aee016a8c0877e0f1577
-
SHA1
b07c8d59c64c0e22c2bddb18bac512fad46d493d
-
SHA256
02b7cf6d81b1723d0153b24ffae8ef0e183ee98aa40b0b15e1b31527c3368cd4
-
SHA512
7c48113c0183124848f05d148ac4ff1be7970d5a980633f8470ac206c221f066c54ad5a3e98ce01a515ebc2d8870a48e23b0afc087c2e8881534df9aa8c68f3b
-
SSDEEP
49152:wW/0gqRwuMCoWn8iC2elj9hYe3qRNsrtGKT9hCHp1tVxNxrEh3S/P+hmBCSmsXVL:rCoW8iCRjcqqRNsr0715a3SuhmBdTlv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4796 2024-04-17_14d8c900ec33aee016a8c0877e0f1577_mafia.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4796 2024-04-17_14d8c900ec33aee016a8c0877e0f1577_mafia.exe 4796 2024-04-17_14d8c900ec33aee016a8c0877e0f1577_mafia.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1852 wrote to memory of 4796 1852 2024-04-17_14d8c900ec33aee016a8c0877e0f1577_mafia.exe 85 PID 1852 wrote to memory of 4796 1852 2024-04-17_14d8c900ec33aee016a8c0877e0f1577_mafia.exe 85 PID 1852 wrote to memory of 4796 1852 2024-04-17_14d8c900ec33aee016a8c0877e0f1577_mafia.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-17_14d8c900ec33aee016a8c0877e0f1577_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-17_14d8c900ec33aee016a8c0877e0f1577_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\jds240607890.tmp\2024-04-17_14d8c900ec33aee016a8c0877e0f1577_mafia.exe"C:\Users\Admin\AppData\Local\Temp\jds240607890.tmp\2024-04-17_14d8c900ec33aee016a8c0877e0f1577_mafia.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4796
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\jds240607890.tmp\2024-04-17_14d8c900ec33aee016a8c0877e0f1577_mafia.exe
Filesize1.6MB
MD5db617e33f27f294d96bfef2e0df21646
SHA1febd62a7b905e1ecea0a366b5edd0839c54be1d7
SHA256aaf107879a63277ab92317c24c0cb476e638483c628964de2b4ef1fbcc05c460
SHA5129f600b80ccb9593ede90e901e9425fac77da9e4c924ef27b21cfe989cfb5839dcffcbf7292c0f465e123053a69a03750994f65597b43b47ae915a06942d5b430
-
Filesize
155KB
MD54a050d4d508f78e83878c990f10ade93
SHA1d229243434a89ff778c4a503203d3b01db955336
SHA2565fe6623fb5a3c9a084aaf16a97f181023b57e0a3a6c994867e4e556688f8cb3c
SHA512869ab645a71e50f2578ef9d41de5e8b039801c6e7f5a32b3413b09314673fb4e4d1521b90acffa99214d5b65602d7529ff9b89371eac70db485f7f24b3f1face