Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23/02/2024, 06:56

General

  • Target

    2024-02-23_b77042d7b9ddce54524ae26c211a3d70_mafia.exe

  • Size

    293KB

  • MD5

    b77042d7b9ddce54524ae26c211a3d70

  • SHA1

    2edc198524733aa2462550c8d7eef5c443bc0ac6

  • SHA256

    7e14399ebe5d8b91d26ccfe4fe876cee6e70882c404e7eadaa0b622a4b3d49b3

  • SHA512

    258e1caf85a2c0a83faf19905d0f883e65489c3bcdbfd65f4eaee2e038cadfb802131659e31dc77497dd7c7ae0b8727b718107c63e1d41771cd59ab967d2daa5

  • SSDEEP

    6144:1DUKgm4Wiw6pbnyhJZ1uQtv3NxjMjtG6ZLlYZ3:1gK7ow6pbnyzlv3NuLZLlYZ3

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-23_b77042d7b9ddce54524ae26c211a3d70_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-23_b77042d7b9ddce54524ae26c211a3d70_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Users\Admin\AppData\Local\Temp\n1214\s1214.exe
      "C:\Users\Admin\AppData\Local\Temp\n1214\s1214.exe" ins.exe /e12129210 /u50d19690-97d8-405e-bebb-08625bc06f2f
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2204

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\n1214\s1214.exe

    Filesize

    269KB

    MD5

    18332589d7068650441ab03e352a3441

    SHA1

    df6c95c22d184cff4003e5048282eb007389b86c

    SHA256

    4b2956d97453ae7889ba67a84c88c3e64f19786c7f871a1e79217e168cbe133f

    SHA512

    6923bf1cbe68508ed146b26ab4ee8f74b6949d5dde2706e7a888ed334f9dde9f659daa5de48b3dbaff34ab46e6a5dbbd4be118f97d31fc25e1d1df2ef2d88f34

  • memory/2204-14-0x0000000000960000-0x000000000096A000-memory.dmp

    Filesize

    40KB

  • memory/2204-15-0x000007FEF5360000-0x000007FEF5CFD000-memory.dmp

    Filesize

    9.6MB

  • memory/2204-16-0x0000000000470000-0x00000000004F0000-memory.dmp

    Filesize

    512KB

  • memory/2204-17-0x000007FEF5360000-0x000007FEF5CFD000-memory.dmp

    Filesize

    9.6MB

  • memory/2204-18-0x0000000000470000-0x00000000004F0000-memory.dmp

    Filesize

    512KB

  • memory/2204-19-0x0000000000470000-0x00000000004F0000-memory.dmp

    Filesize

    512KB

  • memory/2204-20-0x0000000000470000-0x00000000004F0000-memory.dmp

    Filesize

    512KB

  • memory/2204-21-0x0000000000470000-0x00000000004F0000-memory.dmp

    Filesize

    512KB

  • memory/2204-22-0x0000000000470000-0x00000000004F0000-memory.dmp

    Filesize

    512KB

  • memory/2204-23-0x000007FEF5360000-0x000007FEF5CFD000-memory.dmp

    Filesize

    9.6MB

  • memory/2204-24-0x0000000000470000-0x00000000004F0000-memory.dmp

    Filesize

    512KB

  • memory/2204-25-0x0000000000470000-0x00000000004F0000-memory.dmp

    Filesize

    512KB

  • memory/2204-26-0x000007FEF5360000-0x000007FEF5CFD000-memory.dmp

    Filesize

    9.6MB