Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/04/2024, 22:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-22_387b6d26132c390c5d67402805f49c0d_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-22_387b6d26132c390c5d67402805f49c0d_mafia.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-22_387b6d26132c390c5d67402805f49c0d_mafia.exe
-
Size
486KB
-
MD5
387b6d26132c390c5d67402805f49c0d
-
SHA1
cfa55b766caa485e7abcce6d428fca9e421a06a7
-
SHA256
583a7841b8999f1eda758cc12132dd31efd57fd2ccce9d3475d60f2c8e8d7cdb
-
SHA512
46c7203b04f20e53e3b3b29ce409b3857c3a0c3fb7307bc20a0da690755ee6eb95b60a9225de44641e03d68e9a676c58569d2d1219c5866ced70fb3e62dc884b
-
SSDEEP
12288:3O4rfItL8HPFmGx9OiWa9V7YP10pd/91MFxNDgt7rKxUYXhW:3O4rQtGPcsYiWanUP10X/91MBgt3KxUj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1520 197A.tmp -
Executes dropped EXE 1 IoCs
pid Process 1520 197A.tmp -
Loads dropped DLL 1 IoCs
pid Process 360 2024-04-22_387b6d26132c390c5d67402805f49c0d_mafia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 360 wrote to memory of 1520 360 2024-04-22_387b6d26132c390c5d67402805f49c0d_mafia.exe 28 PID 360 wrote to memory of 1520 360 2024-04-22_387b6d26132c390c5d67402805f49c0d_mafia.exe 28 PID 360 wrote to memory of 1520 360 2024-04-22_387b6d26132c390c5d67402805f49c0d_mafia.exe 28 PID 360 wrote to memory of 1520 360 2024-04-22_387b6d26132c390c5d67402805f49c0d_mafia.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_387b6d26132c390c5d67402805f49c0d_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-22_387b6d26132c390c5d67402805f49c0d_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:360 -
C:\Users\Admin\AppData\Local\Temp\197A.tmp"C:\Users\Admin\AppData\Local\Temp\197A.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-04-22_387b6d26132c390c5d67402805f49c0d_mafia.exe E714DD0F42EF3BF49B841076B95F4D9C6396DAC0AEADDAD47449213FCE4811A345A0691DDF97F34F4FE0BD57242282079E463AF94AD25CF5A707BA415ED17A462⤵
- Deletes itself
- Executes dropped EXE
PID:1520
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
486KB
MD5bd6e2aa1e880bd0a0f5ae1d652bc14b0
SHA1219c1776523423f992f8cb08dbaec25a64498030
SHA256c98e57e5c7008fe5050a247bbe91cf0a20a41b6e9fce9e9970b0f127eaf21c8d
SHA5120c9013b6276031d30fe4237e047a4c6c5a24ed586a30d3ef555037a447ad74b823ca176f98a47f22a7e1295aaf196077f7a47ede1ca7a5397a1c97e036e44e03