Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
23/01/2024, 16:33
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-23_bd64d4f1190996d614c25459f9e3a043_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-23_bd64d4f1190996d614c25459f9e3a043_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-23_bd64d4f1190996d614c25459f9e3a043_mafia.exe
-
Size
462KB
-
MD5
bd64d4f1190996d614c25459f9e3a043
-
SHA1
0cc19bcfaba95afe6a77732aace3b041f6e0b331
-
SHA256
608da44d210ec6d2dac6b3c0243840332a4dfd7cf67d72d7b3f157341774efe6
-
SHA512
af86b356c0847c94550c4b8e1bc3d91a535eb7db8057319db9ce977460218fdb6461da814763d0cc4eb7fc308bfe7cb61eb8f5078850a4cfe2444059174a94c2
-
SSDEEP
6144:zRPu8zwNAZYCZrIik3tHP4Cinxnf0tFitfBbAWaKFPg/PwKb7KQsH5f:zJrIik3eFJ8GZbAWaTnBbe9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1028 900F.tmp -
Loads dropped DLL 1 IoCs
pid Process 3036 2024-01-23_bd64d4f1190996d614c25459f9e3a043_mafia.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2460 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1028 900F.tmp -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2460 WINWORD.EXE 2460 WINWORD.EXE 2460 WINWORD.EXE 2460 WINWORD.EXE 2460 WINWORD.EXE 2460 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3036 wrote to memory of 1028 3036 2024-01-23_bd64d4f1190996d614c25459f9e3a043_mafia.exe 28 PID 3036 wrote to memory of 1028 3036 2024-01-23_bd64d4f1190996d614c25459f9e3a043_mafia.exe 28 PID 3036 wrote to memory of 1028 3036 2024-01-23_bd64d4f1190996d614c25459f9e3a043_mafia.exe 28 PID 3036 wrote to memory of 1028 3036 2024-01-23_bd64d4f1190996d614c25459f9e3a043_mafia.exe 28 PID 1028 wrote to memory of 2460 1028 900F.tmp 29 PID 1028 wrote to memory of 2460 1028 900F.tmp 29 PID 1028 wrote to memory of 2460 1028 900F.tmp 29 PID 1028 wrote to memory of 2460 1028 900F.tmp 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-23_bd64d4f1190996d614c25459f9e3a043_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-23_bd64d4f1190996d614c25459f9e3a043_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\900F.tmp"C:\Users\Admin\AppData\Local\Temp\900F.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-01-23_bd64d4f1190996d614c25459f9e3a043_mafia.exe 522A69422554B2F9F6E48699B9A1400469EF0AEA74D77F441B720D6A79E8C85E6D9D6FE05C27013447A619C4DDBEE4DE3E89907466E6C2C74BBB3DF24EC7D9042⤵
- Executes dropped EXE
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2024-01-23_bd64d4f1190996d614c25459f9e3a043_mafia.docx"3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2460
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD57079891932a64f097abafd233055a1e9
SHA1246d95feafe67689d49a5a4cadba18d3ac1914e5
SHA256c97189b50e5e92be09966d4732b6d61a2e435b2935d60c09989e555ae442e7a1
SHA5126e9ee6427d7cc2474dc634b088cf3f35d06dfb734d2b63fbbc794f4083b4b5754379daff4804bf5024b1b430aa5e50fa6d839d3473ceeed3043d373c85e9862a
-
Filesize
462KB
MD520bc7d8b685b7f586b36ea8301ea4cc9
SHA1fd68e807a6fd2cea481fad17b84cf847eb462ddc
SHA256bbce2810d1317521af5e3a3ce70ff59526eb76f08cfdecbca67b05d3128d29d1
SHA512f851476f5c7c1cf5e4c47c233bf5e0d7ddaf542ca04beeb2db450a385b0f035faeee83282898677dc263f7b6025820a468a7ab6007f5f81a40f4f49874ce0ca3