Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/02/2024, 10:26 UTC
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-23_0da967c548749fb7fc017f5a0b9e53fa_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-23_0da967c548749fb7fc017f5a0b9e53fa_mafia.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-23_0da967c548749fb7fc017f5a0b9e53fa_mafia.exe
-
Size
292KB
-
MD5
0da967c548749fb7fc017f5a0b9e53fa
-
SHA1
041a0200cee68cedd215d18f1abc7d04bd5c15bf
-
SHA256
014a71e4fae26f5a79b226915d5c2dba26c21ddf880116349f414f663c1692ca
-
SHA512
00f12e1ae36c7bcd79ede722e2a6359f9d1838149005d89cf1c25b7693d96042e5a431cce7dc26c6a334dc94462693565c0072c5b1b2ff71e80a36923c0710e1
-
SSDEEP
6144:LanPst8v78IwA7I97x4fg+8t9d5Z0DRUIH0xsNJEe:LoPstEPwA7I9750Nz0ONJEe
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1352 s9684.exe -
Loads dropped DLL 4 IoCs
pid Process 1336 2024-02-23_0da967c548749fb7fc017f5a0b9e53fa_mafia.exe 1336 2024-02-23_0da967c548749fb7fc017f5a0b9e53fa_mafia.exe 1336 2024-02-23_0da967c548749fb7fc017f5a0b9e53fa_mafia.exe 1336 2024-02-23_0da967c548749fb7fc017f5a0b9e53fa_mafia.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1336 2024-02-23_0da967c548749fb7fc017f5a0b9e53fa_mafia.exe 1352 s9684.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1352 s9684.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1352 s9684.exe 1352 s9684.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1336 wrote to memory of 1352 1336 2024-02-23_0da967c548749fb7fc017f5a0b9e53fa_mafia.exe 28 PID 1336 wrote to memory of 1352 1336 2024-02-23_0da967c548749fb7fc017f5a0b9e53fa_mafia.exe 28 PID 1336 wrote to memory of 1352 1336 2024-02-23_0da967c548749fb7fc017f5a0b9e53fa_mafia.exe 28 PID 1336 wrote to memory of 1352 1336 2024-02-23_0da967c548749fb7fc017f5a0b9e53fa_mafia.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-23_0da967c548749fb7fc017f5a0b9e53fa_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-23_0da967c548749fb7fc017f5a0b9e53fa_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\n9684\s9684.exe"C:\Users\Admin\AppData\Local\Temp\n9684\s9684.exe" ins.exe /e11709017 /u5256af57-a14c-4fa9-bca9-79340a0000132⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1352
-
Network
-
Remote address:8.8.8.8:53Requestapi.socdn.comIN AResponseapi.socdn.comIN CNAME615321.parkingcrew.net615321.parkingcrew.netIN A13.248.148.254615321.parkingcrew.netIN A76.223.26.96
-
Remote address:13.248.148.254:80RequestGET /installer/5256af57-a14c-4fa9-bca9-79340a000013/11709017/config HTTP/1.1
User-Agent: DownloadMR/3.1.2 (MSIE 9.11;Windows NT 6.1.7601 SP1;WOW64;.NET CLR 2.0.50727 SP2; .NET CLR 3.0 SP2; .NET CLR 3.5 SP1; .NET CLR 4; .NET CLR 4.0;DB IE11;m=X9SRE/X9SRE-3F/X9SRi/X9SRi-3F;northstar)
Accept-Language: en-US
Host: api.socdn.com
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Server: nginx
Vary: Accept-Encoding
Vary: Accept-Encoding
X-Redirect: skenzo
X-Buckets: bucket011
X-Adblock-Key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBALquDFETXRn0Hr05fUP7EJT77xYnPmRbpMy4vk8KYiHnkNpednjOANJcaXDXcKQJN0nXKZJL7TciJD8AoHXK158CAwEAAQ==_MI69FvqpOoonCfa3p3U0TW4I1CQM1VRRwNU/3OtG7q45GPfUyR+BDlNvgv4FAuYVsIDm5Bj84nS/GzX2zr/RFA==
X-Template: tpl_CleanPeppermintBlack_twoclick
X-Language: english
Accept-CH: viewport-width
Accept-CH: dpr
Accept-CH: device-memory
Accept-CH: rtt
Accept-CH: downlink
Accept-CH: ect
Accept-CH: ua
Accept-CH: ua-full-version
Accept-CH: ua-platform
Accept-CH: ua-platform-version
Accept-CH: ua-arch
Accept-CH: ua-model
Accept-CH: ua-mobile
Accept-CH-Lifetime: 30
X-Domain: socdn.com
X-Subdomain: api
-
Remote address:13.248.148.254:80RequestPOST /installer/5256af57-a14c-4fa9-bca9-79340a000013/11709017/event HTTP/1.1
User-Agent: DownloadMR/3.1.2 (MSIE 9.11;Windows NT 6.1.7601 SP1;WOW64;.NET CLR 2.0.50727 SP2; .NET CLR 3.0 SP2; .NET CLR 3.5 SP1; .NET CLR 4; .NET CLR 4.0;DB IE11;m=X9SRE/X9SRE-3F/X9SRi/X9SRi-3F;northstar)
Accept-Language: en-US
Content-Type: application/x-www-form-urlencoded
Host: api.socdn.com
Content-Length: 3394
Expect: 100-continue
ResponseHTTP/1.1 403 Forbidden
Date: Fri, 23 Feb 2024 10:26:55 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 138
Connection: keep-alive
-
13.248.148.254:80http://api.socdn.com/installer/5256af57-a14c-4fa9-bca9-79340a000013/11709017/eventhttps9684.exe4.8kB 4.8kB 13 13
HTTP Request
GET http://api.socdn.com/installer/5256af57-a14c-4fa9-bca9-79340a000013/11709017/configHTTP Response
200HTTP Request
POST http://api.socdn.com/installer/5256af57-a14c-4fa9-bca9-79340a000013/11709017/eventHTTP Response
403
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
269KB
MD55bedbca9b50f0374b405eb0c79ec0195
SHA11a0646caa442f30d86f5ba79c35de34a4ab235fe
SHA2560355e5e23f4f5d2c129c6d5aa680c782898b332a38c02a0b7ef4d0f50b0ea64d
SHA512007fd12814a7a7e8d4182d69a86a2f06350521aa9daf684e2516bf7f22add1f687940a06430b5169f38e41c99ae8cbcc8d1f7c3218c68a127a8c6fe68c36ee6b