Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
2s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 06:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-08_899653ecf1ff01a716a0a45230613f7a_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-08_899653ecf1ff01a716a0a45230613f7a_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-08_899653ecf1ff01a716a0a45230613f7a_mafia.exe
-
Size
467KB
-
MD5
899653ecf1ff01a716a0a45230613f7a
-
SHA1
3c50ec68e5841804db11409c6e151d8dc8c4a853
-
SHA256
3bc81424b09e111a2f62175e586206996d60bca652207d8ada9679eeeecade5a
-
SHA512
6074a07457a9d71edf6c615459b036a0c2cfb6a0cf9a11477e8839f250d7dfb941a8e78912a27cea560497956e89bbf2ce5c904594478aceae6c8c1fa12d0059
-
SSDEEP
6144:jFrJxvldL4c5ONK1xgWbd1s79+iStKv1VCI2GYN0lQ5d4tNOYzRsq/xwosLV2eYx:Bb4bZudi79LddF2GmAbfRJgAUPPKAk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2932 BF2.tmp -
Loads dropped DLL 1 IoCs
pid Process 2864 2024-01-08_899653ecf1ff01a716a0a45230613f7a_mafia.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2932 BF2.tmp -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2932 2864 2024-01-08_899653ecf1ff01a716a0a45230613f7a_mafia.exe 16 PID 2864 wrote to memory of 2932 2864 2024-01-08_899653ecf1ff01a716a0a45230613f7a_mafia.exe 16 PID 2864 wrote to memory of 2932 2864 2024-01-08_899653ecf1ff01a716a0a45230613f7a_mafia.exe 16 PID 2864 wrote to memory of 2932 2864 2024-01-08_899653ecf1ff01a716a0a45230613f7a_mafia.exe 16 PID 2932 wrote to memory of 3048 2932 BF2.tmp 29 PID 2932 wrote to memory of 3048 2932 BF2.tmp 29 PID 2932 wrote to memory of 3048 2932 BF2.tmp 29 PID 2932 wrote to memory of 3048 2932 BF2.tmp 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-08_899653ecf1ff01a716a0a45230613f7a_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-08_899653ecf1ff01a716a0a45230613f7a_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\BF2.tmp"C:\Users\Admin\AppData\Local\Temp\BF2.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-08_899653ecf1ff01a716a0a45230613f7a_mafia.exe 61F51A41D320D4F41116D396A6EB6DD05C783EF76A406217627C1F46C749BC81DC8F119178C6FDB921ACFD32AD625525E2662970D7A771BF5A54C9479B52EA712⤵
- Executes dropped EXE
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2024-01-08_899653ecf1ff01a716a0a45230613f7a_mafia.doc"3⤵PID:3048
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122884⤵PID:2456
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5622b045e4eab36ffcd3fc05b0a636241
SHA1b8758fc7f8501a7d3c5c91f05dc880375e84a31c
SHA256c33f0b3bb28555aae6cf104e3aecd1b2419f7c5ecc94f7ff1adba10425838bcf
SHA51257dcae1d76cc983c98505b3d24fee2de24c3832bc09f2b2cf8381c50708438be1682c24930a3d396f88771dec8c65292aab8dcb73451a55c663b1414e60c59cd
-
Filesize
30KB
MD53a30b0bf75fe9a4801face192cabcceb
SHA1da23e608b5b0816349087dd6b1d53456db08cd1e
SHA25643d81cfb61e0ccd77bf55478e04568d83dd311dbf00b9662f93be9d0ae7b4738
SHA51203fd8e47bda6fde0dde7b9a7fec2981129e3575b84727dabe82908f387d26971bddad514136d8c412834a666f794877b21f96417754e2847cac74464dd572d70
-
Filesize
20KB
MD57e9602b040b8931e8d2b15ea8537b566
SHA19988711bbdc059a49599ae0bafc69b2c11110407
SHA25658fc520d74d5b83cf4cac4beb5f0a6736dc0aac215ebb872061fc9981670ca69
SHA512802f89273c92dc55ebcf4c391803cac9dea4cba349d0754cfcdf83da0ee32fd981bf6909c208551ce95c479da85a288f3cc4c18d3cfc488198aa9eb1d89e8d38
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
33KB
MD5cea62786963969510ae8189cb33bedf0
SHA1ac5f4a766ec5e63a6fbad2b4439eab3f5d1ecb46
SHA256151cd4d3988078e7e610cfefb4f792f55507474cc55eecd13f4ae9ff4b7469f5
SHA5125e21377415509d469e1ef8dbf3de579e692a04677cd8137b9223b387707473f9c43a8600fe66474472c4735c1068d76593fccbb11bafb30d8dcfd48b8878ced8