Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
21/04/2024, 04:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-21_3716abd4cae340ecac36aaaf95a53ac2_mafia.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-04-21_3716abd4cae340ecac36aaaf95a53ac2_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-21_3716abd4cae340ecac36aaaf95a53ac2_mafia.exe
-
Size
428KB
-
MD5
3716abd4cae340ecac36aaaf95a53ac2
-
SHA1
b76c3e6c838b520f9176edf74e5fa1700715c520
-
SHA256
916d43a135c05a288457d4be0c8044b83eca1c669996ebfb6b503bc4aeef6b5d
-
SHA512
4f35bf0e257f5b23dcce3da8e018bf777781cc7bd7a8e1216913fee282d27975cfb829575c14b3f4eb04dd3404cc7bf00496bcaba1904e28f541f5b5a5d71935
-
SSDEEP
6144:gVdvczEb7GUOpYWhNVynE/mFBmzFedLsWceuuS9NpN+9y6g5tLZoZqHR:gZLolhNVyEImB+TuuSjpNKy6g5xMqHR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2232 925.tmp -
Executes dropped EXE 1 IoCs
pid Process 2232 925.tmp -
Loads dropped DLL 1 IoCs
pid Process 2980 2024-04-21_3716abd4cae340ecac36aaaf95a53ac2_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2232 2980 2024-04-21_3716abd4cae340ecac36aaaf95a53ac2_mafia.exe 28 PID 2980 wrote to memory of 2232 2980 2024-04-21_3716abd4cae340ecac36aaaf95a53ac2_mafia.exe 28 PID 2980 wrote to memory of 2232 2980 2024-04-21_3716abd4cae340ecac36aaaf95a53ac2_mafia.exe 28 PID 2980 wrote to memory of 2232 2980 2024-04-21_3716abd4cae340ecac36aaaf95a53ac2_mafia.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_3716abd4cae340ecac36aaaf95a53ac2_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-21_3716abd4cae340ecac36aaaf95a53ac2_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\925.tmp"C:\Users\Admin\AppData\Local\Temp\925.tmp" --pingC:\Users\Admin\AppData\Local\Temp\2024-04-21_3716abd4cae340ecac36aaaf95a53ac2_mafia.exe 0076AA09E46E17B84ED11A400985DB3E89E603B73837FE7107F64917B2E4E98BC32594AFAB5F6B4DDFD73580A96236E740DF965E48F4B184C54C79101DFB087C2⤵
- Deletes itself
- Executes dropped EXE
PID:2232
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
428KB
MD506eb4ee9da5595336b1cba955ad29c8a
SHA1ed707e0a54728e2fd3b76188a9cf2b7c0c451817
SHA256203ade8275e819a30fb98b1147c1d380f756b4bc8bf5176f105bab3bd34e50ff
SHA512403a40be34fa074877984e318a10896e0e76cbe059ed5ba2f41efb4e087f55f27d8e3e117187cc1b80815b25ab47d737dd8461a7658ae0b7262304e6ab8d5536