Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2024, 00:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-20_52845de3b3a50bfc8cffe222bd63088b_mafia.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-20_52845de3b3a50bfc8cffe222bd63088b_mafia.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-20_52845de3b3a50bfc8cffe222bd63088b_mafia.exe
-
Size
414KB
-
MD5
52845de3b3a50bfc8cffe222bd63088b
-
SHA1
da2378beb9b72f8199b1ff75d8702d85b702417d
-
SHA256
2a9906215fa767cb1c1fd1fe87ba70e063e039b59b06cc7542bb0ff5a8260988
-
SHA512
1d5c46f263d2c679bc1646385dfcdb6bb2a7b2bf3c6be8aab81ae9d921b38bce4d62c11b2a6048779a41170a4080d4ff6e0e69fe0e7b253a40cf6a4f9fe8e688
-
SSDEEP
6144:Wucyz4obQmKkWb6ekie+ogU6BY5E1yd77I/T/jEvpJ8ZDpdS0W6BXCdiqqTl:Wq4w/ekieZgU607u/gutpdSZGsYTl
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4644 2C8E.tmp -
Executes dropped EXE 1 IoCs
pid Process 4644 2C8E.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1256 wrote to memory of 4644 1256 2024-04-20_52845de3b3a50bfc8cffe222bd63088b_mafia.exe 85 PID 1256 wrote to memory of 4644 1256 2024-04-20_52845de3b3a50bfc8cffe222bd63088b_mafia.exe 85 PID 1256 wrote to memory of 4644 1256 2024-04-20_52845de3b3a50bfc8cffe222bd63088b_mafia.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-20_52845de3b3a50bfc8cffe222bd63088b_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-20_52845de3b3a50bfc8cffe222bd63088b_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\2C8E.tmp"C:\Users\Admin\AppData\Local\Temp\2C8E.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-04-20_52845de3b3a50bfc8cffe222bd63088b_mafia.exe FC2DF6292EEB0DA669BFE21EB5E46CE53D68E074EFBB44D9D4A0DC5C2CB95838A9321B4EF9B332ADBA0BBA321CB169FC3370E1ECA44E2F8EEBAB163AC92EDC6B2⤵
- Deletes itself
- Executes dropped EXE
PID:4644
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
414KB
MD5ace75258d30c473cfb125f9827fd7bba
SHA1ffcb7fe4b51ce18022101ebf073914f7758096df
SHA256ef6330c138f51800978c6cd4ac67f8c176be926ae1ee3d31ec1722faf18560af
SHA5124c43caa1b0e248a6ac71d4eaaf7a8b7022014597bb7134fc22ad2fdcfa27d328564043e4fe0d789b52755f085edc1e39e4b627ab533883d3fd4db1855dd7e8fb