Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 08:28
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-19_6c7f7a4e2a52819d018dfb04acd04ec3_mafia.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-04-19_6c7f7a4e2a52819d018dfb04acd04ec3_mafia.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-19_6c7f7a4e2a52819d018dfb04acd04ec3_mafia.exe
-
Size
479KB
-
MD5
6c7f7a4e2a52819d018dfb04acd04ec3
-
SHA1
d7ad0f2f1666a7b9dc4832abc2f1b3c3a4760578
-
SHA256
cabbd281f9cd7e906caec895c9516823349cabc97e2e5b81ae56d1917a261df4
-
SHA512
6e098ea30e7953c0919d94a5e582f6777b4cc3200f338be72dfb857cf7aea5332bb0c89975f691c47a5738749bd2d46db422c12c1444840824a4accf4969f7c8
-
SSDEEP
12288:bO4rfItL8HA4fYlJRWirHGJS+3goz75UO:bO4rQtGA4fxKmcozVUO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4792 2D69.tmp -
Executes dropped EXE 1 IoCs
pid Process 4792 2D69.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2284 wrote to memory of 4792 2284 2024-04-19_6c7f7a4e2a52819d018dfb04acd04ec3_mafia.exe 87 PID 2284 wrote to memory of 4792 2284 2024-04-19_6c7f7a4e2a52819d018dfb04acd04ec3_mafia.exe 87 PID 2284 wrote to memory of 4792 2284 2024-04-19_6c7f7a4e2a52819d018dfb04acd04ec3_mafia.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-19_6c7f7a4e2a52819d018dfb04acd04ec3_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-19_6c7f7a4e2a52819d018dfb04acd04ec3_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\2D69.tmp"C:\Users\Admin\AppData\Local\Temp\2D69.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-04-19_6c7f7a4e2a52819d018dfb04acd04ec3_mafia.exe A80B7F0249FC75C70A15575201E6FA262DD412C3032213524DB84BF520D01060926A09B0FB9D4418D2EC40E0747E56E36DEAC5BBED7594D26A77C5BA675678C62⤵
- Deletes itself
- Executes dropped EXE
PID:4792
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
479KB
MD54435eb4c5bd9f165a2d6e6e45d305a6b
SHA1a92301f48ed23b181862ccda6ff1819c38a2bd2a
SHA25689517d3fd7f36465cfc4796f59b36a2014020aa1bad75002a03ad33d6bd343b9
SHA5129547256575d9562c3ef0c5ba500ebe3d539dd4e89add4e85afed90ab3b90624c591fe7666f740bb9da733f0b7d99608492eca8b7b4c7d724805d1602d728fd55