Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    154s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/03/2024, 07:35

General

  • Target

    2024-03-14_5931e1ecebc9f9dd7b5134f870814506_mafia_stonedrill.exe

  • Size

    395KB

  • MD5

    5931e1ecebc9f9dd7b5134f870814506

  • SHA1

    33b39356f906f7f7340e21d280c918bb3383057f

  • SHA256

    51d7a3bb0dd46fbb55f2ad4aca07e573b53a588bfc41ca7620cf57e5730939cf

  • SHA512

    6d011b97300d21acf0bcce247dcc23bcc73cfc1f9a47e69621b75b3bbb962faa46ecedde4058d9acaab6bc2a937f90a2e72383747a8d2466c195559114f23f6f

  • SSDEEP

    12288:PqYXje0uF1k64/QSywqP0T8oIN1AHDFhY25fC2WF9sK2d4q:PqYuF1k64/Q9j28okAHDHY25fC2WF9sN

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-14_5931e1ecebc9f9dd7b5134f870814506_mafia_stonedrill.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-14_5931e1ecebc9f9dd7b5134f870814506_mafia_stonedrill.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2440
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:688
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v RESTART_STICKY_NOTESS /f /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2244
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v RESTART_STICKY_NOTESS /f /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"
          4⤵
          • Adds Run key to start application
          • Modifies registry key
          PID:2160
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c copy "C:\Users\Admin\AppData\Local\Temp\2024-03-14_5931e1ecebc9f9dd7b5134f870814506_mafia_stonedrill.exe" "C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"
      2⤵
        PID:4104
      • C:\Users\Admin\AppData\Local\Temp\StikyNote.exe
        "C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1624
        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
          "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4808
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4136 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:2280

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\StikyNote.exe

        Filesize

        384KB

        MD5

        1c8ff52d6a756ab841c6b23d2aa14b8f

        SHA1

        6357c60d1001ff89cd0dace6be92d024463a7e63

        SHA256

        644bd4103c9debdaca929d7b5ee1e3c4123058d970b1e3f9c90149992c965223

        SHA512

        306b57569f36e4be7d2f372dfb7968faec0fcf1dc36f31eea43843661051f6fd54d353352458e8624561601c5cff121c485425fb792bac4606f044deecc1cf7b

      • C:\Users\Admin\AppData\Local\Temp\StikyNote.exe

        Filesize

        192KB

        MD5

        299d1478d37c3c8c9d59758416f76058

        SHA1

        ab2dac296a6bc62ad06eeb3f9f96189284d94a54

        SHA256

        b9528b029982bfff510c34e879dd28ec7ebe81e917971043c238eb0b5f29fbd1

        SHA512

        da0b21f5b6ea8d2684fc3da80c66b474b94326ec4ccc65f86c19c3990754e22f5d8ca6c06138f2c5a911fc423d1e53cc7c3e1598c78d6be29f567d85294a3e64

      • C:\Users\Admin\AppData\Local\Temp\StikyNote.exe

        Filesize

        395KB

        MD5

        5931e1ecebc9f9dd7b5134f870814506

        SHA1

        33b39356f906f7f7340e21d280c918bb3383057f

        SHA256

        51d7a3bb0dd46fbb55f2ad4aca07e573b53a588bfc41ca7620cf57e5730939cf

        SHA512

        6d011b97300d21acf0bcce247dcc23bcc73cfc1f9a47e69621b75b3bbb962faa46ecedde4058d9acaab6bc2a937f90a2e72383747a8d2466c195559114f23f6f

      • C:\Users\Admin\AppData\Local\Temp\StikyNote.tmp

        Filesize

        384KB

        MD5

        0529b9987af7ba27a1ac05bf76a2094e

        SHA1

        57948ff0ff2b1711433bef15ecb5658ba711b93e

        SHA256

        0521ce1070503188787b48ff6215774f085644cd3c8731a01c8b0741d5532f6d

        SHA512

        6b65014428a26aa0196d2dbdfb2c385779231ef82c9a5686292011acbd2ad4578f93c95e3ec419040bc8c1146201e873311968cd218fef920ce4f8be0036fe04

      • C:\Users\Admin\AppData\Local\Temp\StikyNote.tmp

        Filesize

        395KB

        MD5

        a04f690c526bbc9a1a8a9474ccf55b6a

        SHA1

        3905cd1b394778c3dc281de8b89ad0b0bddc9eed

        SHA256

        b8f87d8aee50173089c18c4fdf906c1a8c45e2c7af54f0dbf4e3f8e9238397c4

        SHA512

        11df9ddff4781f87e815c557323dcb2fb1f5fdec1c7bc036e9372a0c3008cb65bc14a573b8f0f76e728ce3a74d0f86d55b0d2364fa6ad73e74168549e76f1e30

      • C:\Users\Admin\AppData\Local\Temp\setup.tmp

        Filesize

        47B

        MD5

        72a392628d7f368bb9bc9689a694f55a

        SHA1

        feacee9c66028a333446f2c968bcb3d567a4033d

        SHA256

        afa60141aee93d7e3f3d8d296e36de9956f588a6cad99f8e79ce36ab88e828dd

        SHA512

        76f40be7d3e0de960c7bc199fd094c64588841e5b6a1b99bd7fd2e3b53f9e381ded992ee6d67848dd4fda755416792ff6e29bf0acf1a348796dcf7e9bf96229e

      • memory/688-6-0x00000000012F0000-0x00000000012F3000-memory.dmp

        Filesize

        12KB

      • memory/1624-9-0x0000000000C30000-0x0000000000C9B000-memory.dmp

        Filesize

        428KB

      • memory/1624-15-0x0000000075580000-0x0000000075670000-memory.dmp

        Filesize

        960KB

      • memory/1624-17-0x0000000000C30000-0x0000000000C9B000-memory.dmp

        Filesize

        428KB

      • memory/1624-18-0x0000000075580000-0x0000000075670000-memory.dmp

        Filesize

        960KB

      • memory/2440-12-0x0000000000F70000-0x0000000000FDB000-memory.dmp

        Filesize

        428KB

      • memory/2440-0-0x0000000000F70000-0x0000000000FDB000-memory.dmp

        Filesize

        428KB

      • memory/4808-16-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB