Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 04:50
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-18_215114e74b6e19823efae200040f04e6_mafia.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-08-18_215114e74b6e19823efae200040f04e6_mafia.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-18_215114e74b6e19823efae200040f04e6_mafia.exe
-
Size
414KB
-
MD5
215114e74b6e19823efae200040f04e6
-
SHA1
986e18ac5a50bae44e0ba7888d2227354c2add5c
-
SHA256
caa38099ad884421d7114fd9d7ed6d77d054a364845d99ba69b650022ed2ed5b
-
SHA512
960a4c3339bd3524741fae7ca22651998fd8d1aae1e095277909bfe3cf6198ad881bc539e9731e06439819beee14319a94f106c8fc5eaee0d780e8d8850481b8
-
SSDEEP
12288:Wq4w/ekieZgU6jK7/rncPUG8Scufed6MUl:Wq4w/ekieH6jKvMvcOb
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2548 6721.tmp -
Executes dropped EXE 1 IoCs
pid Process 2548 6721.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-18_215114e74b6e19823efae200040f04e6_mafia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6721.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4432 wrote to memory of 2548 4432 2024-08-18_215114e74b6e19823efae200040f04e6_mafia.exe 91 PID 4432 wrote to memory of 2548 4432 2024-08-18_215114e74b6e19823efae200040f04e6_mafia.exe 91 PID 4432 wrote to memory of 2548 4432 2024-08-18_215114e74b6e19823efae200040f04e6_mafia.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-18_215114e74b6e19823efae200040f04e6_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-18_215114e74b6e19823efae200040f04e6_mafia.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\6721.tmp"C:\Users\Admin\AppData\Local\Temp\6721.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-08-18_215114e74b6e19823efae200040f04e6_mafia.exe DABB943FB8D8CA83807DB942EDB3601611895906046C6087214720AB0A0FD20946012B9427DFD3F97DBB7135231600A741A71450E17155B7C150377641BEA58C2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4340,i,8293235976513689021,7261015831736501466,262144 --variations-seed-version --mojo-platform-channel-handle=4116 /prefetch:81⤵PID:2280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
414KB
MD5ff0fcffe13bed9188be3cceacdb1090b
SHA193a88c05c057c13b6ea6c6604f3142366599c28a
SHA2560ef4bb8eb1069f91d4fdec58a834b0033997ee373dc65dde9fd609f1afe8a7a0
SHA5125650edb42e8bd7935a3f66831195465140a82bd8c827a015cbe29b7028bedad28a44d1f16cb33101ffcfc8493bef8e92743388b36d8f51cfa32bae21748ca71a