Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
28/08/2023, 18:32
Static task
static1
Behavioral task
behavioral1
Sample
c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe
-
Size
297KB
-
MD5
c657d22b1249570e63671d8308061b5f
-
SHA1
b843b3b0cf5d5a19f99785df303d71801725d860
-
SHA256
16129cf0cc147396a30128bb972664a6b817402cab819dbc86d2e613df73f3f1
-
SHA512
9e34c63274c3432ab523828799155dd68bd55b861c83fb596931cefd342689521c2de4dcdf6de83cea6622d2ff39f35e1b0c8726dbc68a7166a9f295d6815e8c
-
SSDEEP
3072:HEQsaTcFyFmaMJuIDxcXb58i40T8o8ElS0WBHPspmq3UswZGviGAkvdnWBZ:HEQsjavXH40N8EQkdkswZ61Wn
Malware Config
Signatures
-
GandCrab payload 4 IoCs
resource yara_rule behavioral1/memory/2780-3-0x0000000000400000-0x0000000000E84000-memory.dmp family_gandcrab behavioral1/memory/2780-4-0x0000000000230000-0x0000000000246000-memory.dmp family_gandcrab behavioral1/memory/2780-11-0x0000000000400000-0x0000000000E84000-memory.dmp family_gandcrab behavioral1/memory/2780-12-0x0000000000230000-0x0000000000246000-memory.dmp family_gandcrab -
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Unexpected DNS network traffic destination 64 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 Destination IP 185.105.226.109 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ugsvsipxage = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe" c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe File opened (read-only) \??\A: c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe File opened (read-only) \??\B: c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe File opened (read-only) \??\E: c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe File opened (read-only) \??\H: c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe File opened (read-only) \??\I: c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe File opened (read-only) \??\J: c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe File opened (read-only) \??\L: c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe File opened (read-only) \??\N: c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe File opened (read-only) \??\R: c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe File opened (read-only) \??\S: c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe File opened (read-only) \??\T: c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe File opened (read-only) \??\W: c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe File opened (read-only) \??\X: c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe File opened (read-only) \??\Z: c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe File opened (read-only) \??\G: c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe File opened (read-only) \??\K: c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe File opened (read-only) \??\O: c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe File opened (read-only) \??\Y: c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe File opened (read-only) \??\P: c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe File opened (read-only) \??\Q: c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe File opened (read-only) \??\U: c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe File opened (read-only) \??\V: c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2780 wrote to memory of 1924 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 28 PID 2780 wrote to memory of 1924 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 28 PID 2780 wrote to memory of 1924 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 28 PID 2780 wrote to memory of 1924 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 28 PID 2780 wrote to memory of 2120 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 30 PID 2780 wrote to memory of 2120 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 30 PID 2780 wrote to memory of 2120 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 30 PID 2780 wrote to memory of 2120 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 30 PID 2780 wrote to memory of 1908 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 33 PID 2780 wrote to memory of 1908 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 33 PID 2780 wrote to memory of 1908 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 33 PID 2780 wrote to memory of 1908 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 33 PID 2780 wrote to memory of 2704 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 35 PID 2780 wrote to memory of 2704 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 35 PID 2780 wrote to memory of 2704 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 35 PID 2780 wrote to memory of 2704 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 35 PID 2780 wrote to memory of 1572 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 37 PID 2780 wrote to memory of 1572 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 37 PID 2780 wrote to memory of 1572 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 37 PID 2780 wrote to memory of 1572 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 37 PID 2780 wrote to memory of 1376 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 39 PID 2780 wrote to memory of 1376 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 39 PID 2780 wrote to memory of 1376 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 39 PID 2780 wrote to memory of 1376 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 39 PID 2780 wrote to memory of 592 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 41 PID 2780 wrote to memory of 592 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 41 PID 2780 wrote to memory of 592 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 41 PID 2780 wrote to memory of 592 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 41 PID 2780 wrote to memory of 588 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 43 PID 2780 wrote to memory of 588 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 43 PID 2780 wrote to memory of 588 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 43 PID 2780 wrote to memory of 588 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 43 PID 2780 wrote to memory of 656 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 47 PID 2780 wrote to memory of 656 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 47 PID 2780 wrote to memory of 656 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 47 PID 2780 wrote to memory of 656 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 47 PID 2780 wrote to memory of 2788 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 49 PID 2780 wrote to memory of 2788 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 49 PID 2780 wrote to memory of 2788 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 49 PID 2780 wrote to memory of 2788 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 49 PID 2780 wrote to memory of 2112 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 51 PID 2780 wrote to memory of 2112 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 51 PID 2780 wrote to memory of 2112 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 51 PID 2780 wrote to memory of 2112 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 51 PID 2780 wrote to memory of 2036 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 53 PID 2780 wrote to memory of 2036 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 53 PID 2780 wrote to memory of 2036 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 53 PID 2780 wrote to memory of 2036 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 53 PID 2780 wrote to memory of 1532 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 55 PID 2780 wrote to memory of 1532 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 55 PID 2780 wrote to memory of 1532 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 55 PID 2780 wrote to memory of 1532 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 55 PID 2780 wrote to memory of 2908 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 57 PID 2780 wrote to memory of 2908 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 57 PID 2780 wrote to memory of 2908 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 57 PID 2780 wrote to memory of 2908 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 57 PID 2780 wrote to memory of 1204 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 59 PID 2780 wrote to memory of 1204 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 59 PID 2780 wrote to memory of 1204 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 59 PID 2780 wrote to memory of 1204 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 59 PID 2780 wrote to memory of 1876 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 61 PID 2780 wrote to memory of 1876 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 61 PID 2780 wrote to memory of 1876 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 61 PID 2780 wrote to memory of 1876 2780 c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe 61
Processes
-
C:\Users\Admin\AppData\Local\Temp\c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe"C:\Users\Admin\AppData\Local\Temp\c657d22b1249570e63671d8308061b5f_mafia_magniber_JC.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\nslookup.exenslookup politiaromana.bit ns1.virmach.ru2⤵PID:1924
-
-
C:\Windows\SysWOW64\nslookup.exenslookup malwarehunterteam.bit ns1.virmach.ru2⤵PID:2120
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gdcb.bit ns2.virmach.ru2⤵PID:1908
-
-
C:\Windows\SysWOW64\nslookup.exenslookup politiaromana.bit ns2.virmach.ru2⤵PID:2704
-
-
C:\Windows\SysWOW64\nslookup.exenslookup malwarehunterteam.bit ns2.virmach.ru2⤵PID:1572
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gdcb.bit ns1.virmach.ru2⤵PID:1376
-
-
C:\Windows\SysWOW64\nslookup.exenslookup politiaromana.bit ns1.virmach.ru2⤵PID:592
-
-
C:\Windows\SysWOW64\nslookup.exenslookup malwarehunterteam.bit ns1.virmach.ru2⤵PID:588
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gdcb.bit ns2.virmach.ru2⤵PID:656
-
-
C:\Windows\SysWOW64\nslookup.exenslookup politiaromana.bit ns2.virmach.ru2⤵PID:2788
-
-
C:\Windows\SysWOW64\nslookup.exenslookup malwarehunterteam.bit ns2.virmach.ru2⤵PID:2112
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gdcb.bit ns1.virmach.ru2⤵PID:2036
-
-
C:\Windows\SysWOW64\nslookup.exenslookup politiaromana.bit ns1.virmach.ru2⤵PID:1532
-
-
C:\Windows\SysWOW64\nslookup.exenslookup malwarehunterteam.bit ns1.virmach.ru2⤵PID:2908
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gdcb.bit ns2.virmach.ru2⤵PID:1204
-
-
C:\Windows\SysWOW64\nslookup.exenslookup politiaromana.bit ns2.virmach.ru2⤵PID:1876
-
-
C:\Windows\SysWOW64\nslookup.exenslookup malwarehunterteam.bit ns2.virmach.ru2⤵PID:632
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gdcb.bit ns1.virmach.ru2⤵PID:1772
-
-
C:\Windows\SysWOW64\nslookup.exenslookup politiaromana.bit ns1.virmach.ru2⤵PID:2396
-
-
C:\Windows\SysWOW64\nslookup.exenslookup malwarehunterteam.bit ns1.virmach.ru2⤵PID:1212
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gdcb.bit ns2.virmach.ru2⤵PID:1960
-
-
C:\Windows\SysWOW64\nslookup.exenslookup politiaromana.bit ns2.virmach.ru2⤵PID:2592
-
-
C:\Windows\SysWOW64\nslookup.exenslookup malwarehunterteam.bit ns2.virmach.ru2⤵PID:2232
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gdcb.bit ns1.virmach.ru2⤵PID:2468
-
-
C:\Windows\SysWOW64\nslookup.exenslookup politiaromana.bit ns1.virmach.ru2⤵PID:2656
-
-
C:\Windows\SysWOW64\nslookup.exenslookup malwarehunterteam.bit ns1.virmach.ru2⤵PID:1068
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gdcb.bit ns2.virmach.ru2⤵PID:1800
-
-
C:\Windows\SysWOW64\nslookup.exenslookup politiaromana.bit ns2.virmach.ru2⤵PID:2156
-
-
C:\Windows\SysWOW64\nslookup.exenslookup malwarehunterteam.bit ns2.virmach.ru2⤵PID:1480
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gdcb.bit ns1.virmach.ru2⤵PID:1544
-
-
C:\Windows\SysWOW64\nslookup.exenslookup politiaromana.bit ns1.virmach.ru2⤵PID:2184
-
-
C:\Windows\SysWOW64\nslookup.exenslookup malwarehunterteam.bit ns1.virmach.ru2⤵PID:1884
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gdcb.bit ns2.virmach.ru2⤵PID:2364
-
-
C:\Windows\SysWOW64\nslookup.exenslookup politiaromana.bit ns2.virmach.ru2⤵PID:1652
-
-
C:\Windows\SysWOW64\nslookup.exenslookup malwarehunterteam.bit ns2.virmach.ru2⤵PID:1968
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gdcb.bit ns1.virmach.ru2⤵PID:1200
-
-
C:\Windows\SysWOW64\nslookup.exenslookup politiaromana.bit ns1.virmach.ru2⤵PID:1472
-
-
C:\Windows\SysWOW64\nslookup.exenslookup malwarehunterteam.bit ns1.virmach.ru2⤵PID:2216
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gdcb.bit ns2.virmach.ru2⤵PID:2536
-
-
C:\Windows\SysWOW64\nslookup.exenslookup politiaromana.bit ns2.virmach.ru2⤵PID:2160
-
-
C:\Windows\SysWOW64\nslookup.exenslookup malwarehunterteam.bit ns2.virmach.ru2⤵PID:1632
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gdcb.bit ns1.virmach.ru2⤵PID:772
-
-
C:\Windows\SysWOW64\nslookup.exenslookup politiaromana.bit ns1.virmach.ru2⤵PID:1520
-
-
C:\Windows\SysWOW64\nslookup.exenslookup malwarehunterteam.bit ns1.virmach.ru2⤵PID:1528
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gdcb.bit ns2.virmach.ru2⤵PID:2948
-
-
C:\Windows\SysWOW64\nslookup.exenslookup politiaromana.bit ns2.virmach.ru2⤵PID:3008
-
-
C:\Windows\SysWOW64\nslookup.exenslookup malwarehunterteam.bit ns2.virmach.ru2⤵PID:2804
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gdcb.bit ns1.virmach.ru2⤵PID:2800
-
-
C:\Windows\SysWOW64\nslookup.exenslookup politiaromana.bit ns1.virmach.ru2⤵PID:3036
-
-
C:\Windows\SysWOW64\nslookup.exenslookup malwarehunterteam.bit ns1.virmach.ru2⤵PID:1568
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gdcb.bit ns2.virmach.ru2⤵PID:1904
-
-
C:\Windows\SysWOW64\nslookup.exenslookup politiaromana.bit ns2.virmach.ru2⤵PID:2428
-
-
C:\Windows\SysWOW64\nslookup.exenslookup malwarehunterteam.bit ns2.virmach.ru2⤵PID:268
-