Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    2s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    09/01/2024, 06:43

General

  • Target

    2024-01-08_899653ecf1ff01a716a0a45230613f7a_mafia.exe

  • Size

    467KB

  • MD5

    899653ecf1ff01a716a0a45230613f7a

  • SHA1

    3c50ec68e5841804db11409c6e151d8dc8c4a853

  • SHA256

    3bc81424b09e111a2f62175e586206996d60bca652207d8ada9679eeeecade5a

  • SHA512

    6074a07457a9d71edf6c615459b036a0c2cfb6a0cf9a11477e8839f250d7dfb941a8e78912a27cea560497956e89bbf2ce5c904594478aceae6c8c1fa12d0059

  • SSDEEP

    6144:jFrJxvldL4c5ONK1xgWbd1s79+iStKv1VCI2GYN0lQ5d4tNOYzRsq/xwosLV2eYx:Bb4bZudi79LddF2GmAbfRJgAUPPKAk

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-08_899653ecf1ff01a716a0a45230613f7a_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-08_899653ecf1ff01a716a0a45230613f7a_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2864
    • C:\Users\Admin\AppData\Local\Temp\BF2.tmp
      "C:\Users\Admin\AppData\Local\Temp\BF2.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-08_899653ecf1ff01a716a0a45230613f7a_mafia.exe 61F51A41D320D4F41116D396A6EB6DD05C783EF76A406217627C1F46C749BC81DC8F119178C6FDB921ACFD32AD625525E2662970D7A771BF5A54C9479B52EA71
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:2932
      • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2024-01-08_899653ecf1ff01a716a0a45230613f7a_mafia.doc"
        3⤵
          PID:3048
          • C:\Windows\splwow64.exe
            C:\Windows\splwow64.exe 12288
            4⤵
              PID:2456

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\2024-01-08_899653ecf1ff01a716a0a45230613f7a_mafia.doc

        Filesize

        7KB

        MD5

        622b045e4eab36ffcd3fc05b0a636241

        SHA1

        b8758fc7f8501a7d3c5c91f05dc880375e84a31c

        SHA256

        c33f0b3bb28555aae6cf104e3aecd1b2419f7c5ecc94f7ff1adba10425838bcf

        SHA512

        57dcae1d76cc983c98505b3d24fee2de24c3832bc09f2b2cf8381c50708438be1682c24930a3d396f88771dec8c65292aab8dcb73451a55c663b1414e60c59cd

      • C:\Users\Admin\AppData\Local\Temp\BF2.tmp

        Filesize

        30KB

        MD5

        3a30b0bf75fe9a4801face192cabcceb

        SHA1

        da23e608b5b0816349087dd6b1d53456db08cd1e

        SHA256

        43d81cfb61e0ccd77bf55478e04568d83dd311dbf00b9662f93be9d0ae7b4738

        SHA512

        03fd8e47bda6fde0dde7b9a7fec2981129e3575b84727dabe82908f387d26971bddad514136d8c412834a666f794877b21f96417754e2847cac74464dd572d70

      • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

        Filesize

        20KB

        MD5

        7e9602b040b8931e8d2b15ea8537b566

        SHA1

        9988711bbdc059a49599ae0bafc69b2c11110407

        SHA256

        58fc520d74d5b83cf4cac4beb5f0a6736dc0aac215ebb872061fc9981670ca69

        SHA512

        802f89273c92dc55ebcf4c391803cac9dea4cba349d0754cfcdf83da0ee32fd981bf6909c208551ce95c479da85a288f3cc4c18d3cfc488198aa9eb1d89e8d38

      • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

        Filesize

        2B

        MD5

        f3b25701fe362ec84616a93a45ce9998

        SHA1

        d62636d8caec13f04e28442a0a6fa1afeb024bbb

        SHA256

        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

        SHA512

        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

      • \Users\Admin\AppData\Local\Temp\BF2.tmp

        Filesize

        33KB

        MD5

        cea62786963969510ae8189cb33bedf0

        SHA1

        ac5f4a766ec5e63a6fbad2b4439eab3f5d1ecb46

        SHA256

        151cd4d3988078e7e610cfefb4f792f55507474cc55eecd13f4ae9ff4b7469f5

        SHA512

        5e21377415509d469e1ef8dbf3de579e692a04677cd8137b9223b387707473f9c43a8600fe66474472c4735c1068d76593fccbb11bafb30d8dcfd48b8878ced8

      • memory/3048-7-0x000000002F281000-0x000000002F282000-memory.dmp

        Filesize

        4KB

      • memory/3048-9-0x0000000070B6D000-0x0000000070B78000-memory.dmp

        Filesize

        44KB

      • memory/3048-8-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/3048-28-0x0000000070B6D000-0x0000000070B78000-memory.dmp

        Filesize

        44KB

      • memory/3048-43-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB