Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2024, 21:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-22_bcf7efae79d932f8884733c48d48f742_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-22_bcf7efae79d932f8884733c48d48f742_mafia.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-22_bcf7efae79d932f8884733c48d48f742_mafia.exe
-
Size
441KB
-
MD5
bcf7efae79d932f8884733c48d48f742
-
SHA1
f88e0e6ae761ac3b1b189acdadc15cecc0d425ba
-
SHA256
efb6009c8d5c3de5b2f4d07934c810dec672974e3412d29013781b4e56e7eff2
-
SHA512
cfc0b05d1c6952bbc8afe6c0c4a6b98e128c729c861a94a00faa35253cd4d132f1a96449d60f881be2307d972646e91824026c8c2cc9686bab90d4dfd7be88a1
-
SSDEEP
6144:6ajdz4s4mDHq9OXpOd0p6Jiv+vtvnKsejchIHaLgkYX77f68w+RD0leik+xRc:6i4ET7+0pAiv+spjc2awL7SdOGe4Rc
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4388 32C8.tmp -
Executes dropped EXE 1 IoCs
pid Process 4388 32C8.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3680 wrote to memory of 4388 3680 2024-04-22_bcf7efae79d932f8884733c48d48f742_mafia.exe 84 PID 3680 wrote to memory of 4388 3680 2024-04-22_bcf7efae79d932f8884733c48d48f742_mafia.exe 84 PID 3680 wrote to memory of 4388 3680 2024-04-22_bcf7efae79d932f8884733c48d48f742_mafia.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_bcf7efae79d932f8884733c48d48f742_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-22_bcf7efae79d932f8884733c48d48f742_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\32C8.tmp"C:\Users\Admin\AppData\Local\Temp\32C8.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-04-22_bcf7efae79d932f8884733c48d48f742_mafia.exe 40E75973CFD991313E76BF4156B40AABA1260B79E0C74FE33F6A2C55CD7910D4EEF2BD38E631768148DC4AD91EEC8D964E62FD0FF90188F8662CACDD90FF77E52⤵
- Deletes itself
- Executes dropped EXE
PID:4388
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
441KB
MD5446dc9688e4eb23c66b7850faf53c948
SHA164a3209000b447e00b285a147309372c4d74d3b8
SHA2569880dca512c23ef4dd627730c6bedf930c2783af27890062ead873fac2949340
SHA5121429f98a9157f8108230dcbf5b56e053bf213039b85a4517b230d04ef3218f09afedce4a3e89e112ac6ec7c355f32ed47188defd2b728fcb6e29d8c76ca36a4e