Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    03/08/2023, 17:37

General

  • Target

    534c576dfeaa559db6a1b987fe802d84_mafia_JC.exe

  • Size

    540KB

  • MD5

    534c576dfeaa559db6a1b987fe802d84

  • SHA1

    1574d42d4c8dc3c334c0ce1dc74ce590c6e78f17

  • SHA256

    55987718e6b52db738fdbf5550659279a559d07c53d048ce9c0158cd282f06e5

  • SHA512

    b4a33de6f9f57f4a04f16e1155ba9b1e311ba0420d92297c8799a655a5b150704db8ab6c56473f0f243de79d5e4e1657c0f17638b616ce04a5eaa4eaf74a8f56

  • SSDEEP

    12288:txLzMJ8JozBYfw6z7O90dSatRrT88pnWis8g:txsJ8JoqfzXA03PRTs8g

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\534c576dfeaa559db6a1b987fe802d84_mafia_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\534c576dfeaa559db6a1b987fe802d84_mafia_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1328
    • C:\Users\Admin\AppData\Local\Temp\n1316\s1316.exe
      "C:\Users\Admin\AppData\Local\Temp\n1316\s1316.exe" ins.exe /h b34083.api.socdn.com /u 4fe0cf9f-1fe4-4abb-905a-57915bc06f2f /e 11804700 /v "C:\Users\Admin\AppData\Local\Temp\534c576dfeaa559db6a1b987fe802d84_mafia_JC.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2272

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\CabB7FB.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarB87B.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Local\Temp\n1316\s1316.exe

    Filesize

    288KB

    MD5

    094837e66182b13dcfa684ab0714be59

    SHA1

    3170c805ab2f3ebbea91a0b1693cbf14493834fb

    SHA256

    ebb291b372d56dc397a206d0e10bbf15768601c025c5fb1f53e02d8b15eeb602

    SHA512

    d2b3aa2c51e20936bcb4919f17398dd5b2c6c2e73573df379835bb954aa585e9ee995ad584455195348918ee4acfa8e7937a2d5e9e29c1240d0e389599a069e9

  • C:\Users\Admin\AppData\Local\Temp\n1316\s1316.exe

    Filesize

    288KB

    MD5

    094837e66182b13dcfa684ab0714be59

    SHA1

    3170c805ab2f3ebbea91a0b1693cbf14493834fb

    SHA256

    ebb291b372d56dc397a206d0e10bbf15768601c025c5fb1f53e02d8b15eeb602

    SHA512

    d2b3aa2c51e20936bcb4919f17398dd5b2c6c2e73573df379835bb954aa585e9ee995ad584455195348918ee4acfa8e7937a2d5e9e29c1240d0e389599a069e9

  • C:\Users\Admin\AppData\Local\Temp\n1316\s1316.exe

    Filesize

    288KB

    MD5

    094837e66182b13dcfa684ab0714be59

    SHA1

    3170c805ab2f3ebbea91a0b1693cbf14493834fb

    SHA256

    ebb291b372d56dc397a206d0e10bbf15768601c025c5fb1f53e02d8b15eeb602

    SHA512

    d2b3aa2c51e20936bcb4919f17398dd5b2c6c2e73573df379835bb954aa585e9ee995ad584455195348918ee4acfa8e7937a2d5e9e29c1240d0e389599a069e9

  • \Users\Admin\AppData\Local\Temp\n1316\s1316.exe

    Filesize

    288KB

    MD5

    094837e66182b13dcfa684ab0714be59

    SHA1

    3170c805ab2f3ebbea91a0b1693cbf14493834fb

    SHA256

    ebb291b372d56dc397a206d0e10bbf15768601c025c5fb1f53e02d8b15eeb602

    SHA512

    d2b3aa2c51e20936bcb4919f17398dd5b2c6c2e73573df379835bb954aa585e9ee995ad584455195348918ee4acfa8e7937a2d5e9e29c1240d0e389599a069e9

  • \Users\Admin\AppData\Local\Temp\n1316\s1316.exe

    Filesize

    288KB

    MD5

    094837e66182b13dcfa684ab0714be59

    SHA1

    3170c805ab2f3ebbea91a0b1693cbf14493834fb

    SHA256

    ebb291b372d56dc397a206d0e10bbf15768601c025c5fb1f53e02d8b15eeb602

    SHA512

    d2b3aa2c51e20936bcb4919f17398dd5b2c6c2e73573df379835bb954aa585e9ee995ad584455195348918ee4acfa8e7937a2d5e9e29c1240d0e389599a069e9

  • \Users\Admin\AppData\Local\Temp\n1316\s1316.exe

    Filesize

    288KB

    MD5

    094837e66182b13dcfa684ab0714be59

    SHA1

    3170c805ab2f3ebbea91a0b1693cbf14493834fb

    SHA256

    ebb291b372d56dc397a206d0e10bbf15768601c025c5fb1f53e02d8b15eeb602

    SHA512

    d2b3aa2c51e20936bcb4919f17398dd5b2c6c2e73573df379835bb954aa585e9ee995ad584455195348918ee4acfa8e7937a2d5e9e29c1240d0e389599a069e9

  • \Users\Admin\AppData\Local\Temp\n1316\s1316.exe

    Filesize

    288KB

    MD5

    094837e66182b13dcfa684ab0714be59

    SHA1

    3170c805ab2f3ebbea91a0b1693cbf14493834fb

    SHA256

    ebb291b372d56dc397a206d0e10bbf15768601c025c5fb1f53e02d8b15eeb602

    SHA512

    d2b3aa2c51e20936bcb4919f17398dd5b2c6c2e73573df379835bb954aa585e9ee995ad584455195348918ee4acfa8e7937a2d5e9e29c1240d0e389599a069e9

  • memory/2272-128-0x0000000000450000-0x00000000004D0000-memory.dmp

    Filesize

    512KB

  • memory/2272-134-0x0000000000450000-0x00000000004D0000-memory.dmp

    Filesize

    512KB

  • memory/2272-125-0x0000000000890000-0x00000000008DE000-memory.dmp

    Filesize

    312KB

  • memory/2272-126-0x0000000000820000-0x000000000082A000-memory.dmp

    Filesize

    40KB

  • memory/2272-127-0x0000000000450000-0x00000000004D0000-memory.dmp

    Filesize

    512KB

  • memory/2272-92-0x000007FEF5F10000-0x000007FEF68AD000-memory.dmp

    Filesize

    9.6MB

  • memory/2272-129-0x0000000000450000-0x00000000004D0000-memory.dmp

    Filesize

    512KB

  • memory/2272-130-0x000007FEF5F10000-0x000007FEF68AD000-memory.dmp

    Filesize

    9.6MB

  • memory/2272-131-0x0000000000450000-0x00000000004D0000-memory.dmp

    Filesize

    512KB

  • memory/2272-132-0x0000000000450000-0x00000000004D0000-memory.dmp

    Filesize

    512KB

  • memory/2272-133-0x0000000000450000-0x00000000004D0000-memory.dmp

    Filesize

    512KB

  • memory/2272-93-0x0000000000450000-0x00000000004D0000-memory.dmp

    Filesize

    512KB

  • memory/2272-135-0x000007FEF5F10000-0x000007FEF68AD000-memory.dmp

    Filesize

    9.6MB

  • memory/2272-136-0x0000000000450000-0x00000000004D0000-memory.dmp

    Filesize

    512KB

  • memory/2272-137-0x0000000000450000-0x00000000004D0000-memory.dmp

    Filesize

    512KB

  • memory/2272-138-0x0000000000450000-0x00000000004D0000-memory.dmp

    Filesize

    512KB

  • memory/2272-139-0x0000000000450000-0x00000000004D0000-memory.dmp

    Filesize

    512KB

  • memory/2272-140-0x0000000000450000-0x00000000004D0000-memory.dmp

    Filesize

    512KB

  • memory/2272-141-0x0000000000450000-0x00000000004D0000-memory.dmp

    Filesize

    512KB

  • memory/2272-142-0x0000000000450000-0x00000000004D0000-memory.dmp

    Filesize

    512KB

  • memory/2272-143-0x000007FEF5F10000-0x000007FEF68AD000-memory.dmp

    Filesize

    9.6MB