Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
154s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 07:35
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-14_5931e1ecebc9f9dd7b5134f870814506_mafia_stonedrill.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-03-14_5931e1ecebc9f9dd7b5134f870814506_mafia_stonedrill.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-14_5931e1ecebc9f9dd7b5134f870814506_mafia_stonedrill.exe
-
Size
395KB
-
MD5
5931e1ecebc9f9dd7b5134f870814506
-
SHA1
33b39356f906f7f7340e21d280c918bb3383057f
-
SHA256
51d7a3bb0dd46fbb55f2ad4aca07e573b53a588bfc41ca7620cf57e5730939cf
-
SHA512
6d011b97300d21acf0bcce247dcc23bcc73cfc1f9a47e69621b75b3bbb962faa46ecedde4058d9acaab6bc2a937f90a2e72383747a8d2466c195559114f23f6f
-
SSDEEP
12288:PqYXje0uF1k64/QSywqP0T8oIN1AHDFhY25fC2WF9sK2d4q:PqYuF1k64/Q9j28okAHDHY25fC2WF9sN
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation rundll32.exe -
Executes dropped EXE 1 IoCs
pid Process 1624 StikyNote.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RESTART_STICKY_NOTESS = "C:\\Users\\Admin\\AppData\\Local\\Temp\\StikyNote.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1624 set thread context of 4808 1624 StikyNote.exe 104 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 2160 reg.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2440 2024-03-14_5931e1ecebc9f9dd7b5134f870814506_mafia_stonedrill.exe 2440 2024-03-14_5931e1ecebc9f9dd7b5134f870814506_mafia_stonedrill.exe 1624 StikyNote.exe 1624 StikyNote.exe 4808 iexplore.exe 4808 iexplore.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2440 wrote to memory of 688 2440 2024-03-14_5931e1ecebc9f9dd7b5134f870814506_mafia_stonedrill.exe 100 PID 2440 wrote to memory of 688 2440 2024-03-14_5931e1ecebc9f9dd7b5134f870814506_mafia_stonedrill.exe 100 PID 2440 wrote to memory of 688 2440 2024-03-14_5931e1ecebc9f9dd7b5134f870814506_mafia_stonedrill.exe 100 PID 2440 wrote to memory of 688 2440 2024-03-14_5931e1ecebc9f9dd7b5134f870814506_mafia_stonedrill.exe 100 PID 2440 wrote to memory of 688 2440 2024-03-14_5931e1ecebc9f9dd7b5134f870814506_mafia_stonedrill.exe 100 PID 2440 wrote to memory of 4104 2440 2024-03-14_5931e1ecebc9f9dd7b5134f870814506_mafia_stonedrill.exe 101 PID 2440 wrote to memory of 4104 2440 2024-03-14_5931e1ecebc9f9dd7b5134f870814506_mafia_stonedrill.exe 101 PID 2440 wrote to memory of 4104 2440 2024-03-14_5931e1ecebc9f9dd7b5134f870814506_mafia_stonedrill.exe 101 PID 2440 wrote to memory of 1624 2440 2024-03-14_5931e1ecebc9f9dd7b5134f870814506_mafia_stonedrill.exe 103 PID 2440 wrote to memory of 1624 2440 2024-03-14_5931e1ecebc9f9dd7b5134f870814506_mafia_stonedrill.exe 103 PID 2440 wrote to memory of 1624 2440 2024-03-14_5931e1ecebc9f9dd7b5134f870814506_mafia_stonedrill.exe 103 PID 1624 wrote to memory of 4808 1624 StikyNote.exe 104 PID 1624 wrote to memory of 4808 1624 StikyNote.exe 104 PID 1624 wrote to memory of 4808 1624 StikyNote.exe 104 PID 1624 wrote to memory of 4808 1624 StikyNote.exe 104 PID 1624 wrote to memory of 4808 1624 StikyNote.exe 104 PID 1624 wrote to memory of 4808 1624 StikyNote.exe 104 PID 1624 wrote to memory of 4808 1624 StikyNote.exe 104 PID 1624 wrote to memory of 4808 1624 StikyNote.exe 104 PID 1624 wrote to memory of 4808 1624 StikyNote.exe 104 PID 1624 wrote to memory of 4808 1624 StikyNote.exe 104 PID 1624 wrote to memory of 4808 1624 StikyNote.exe 104 PID 688 wrote to memory of 2244 688 rundll32.exe 115 PID 688 wrote to memory of 2244 688 rundll32.exe 115 PID 688 wrote to memory of 2244 688 rundll32.exe 115 PID 2244 wrote to memory of 2160 2244 cmd.exe 117 PID 2244 wrote to memory of 2160 2244 cmd.exe 117 PID 2244 wrote to memory of 2160 2244 cmd.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-14_5931e1ecebc9f9dd7b5134f870814506_mafia_stonedrill.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-14_5931e1ecebc9f9dd7b5134f870814506_mafia_stonedrill.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v RESTART_STICKY_NOTESS /f /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v RESTART_STICKY_NOTESS /f /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"4⤵
- Adds Run key to start application
- Modifies registry key
PID:2160
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c copy "C:\Users\Admin\AppData\Local\Temp\2024-03-14_5931e1ecebc9f9dd7b5134f870814506_mafia_stonedrill.exe" "C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"2⤵PID:4104
-
-
C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4808
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4136 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:81⤵PID:2280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD51c8ff52d6a756ab841c6b23d2aa14b8f
SHA16357c60d1001ff89cd0dace6be92d024463a7e63
SHA256644bd4103c9debdaca929d7b5ee1e3c4123058d970b1e3f9c90149992c965223
SHA512306b57569f36e4be7d2f372dfb7968faec0fcf1dc36f31eea43843661051f6fd54d353352458e8624561601c5cff121c485425fb792bac4606f044deecc1cf7b
-
Filesize
192KB
MD5299d1478d37c3c8c9d59758416f76058
SHA1ab2dac296a6bc62ad06eeb3f9f96189284d94a54
SHA256b9528b029982bfff510c34e879dd28ec7ebe81e917971043c238eb0b5f29fbd1
SHA512da0b21f5b6ea8d2684fc3da80c66b474b94326ec4ccc65f86c19c3990754e22f5d8ca6c06138f2c5a911fc423d1e53cc7c3e1598c78d6be29f567d85294a3e64
-
Filesize
395KB
MD55931e1ecebc9f9dd7b5134f870814506
SHA133b39356f906f7f7340e21d280c918bb3383057f
SHA25651d7a3bb0dd46fbb55f2ad4aca07e573b53a588bfc41ca7620cf57e5730939cf
SHA5126d011b97300d21acf0bcce247dcc23bcc73cfc1f9a47e69621b75b3bbb962faa46ecedde4058d9acaab6bc2a937f90a2e72383747a8d2466c195559114f23f6f
-
Filesize
384KB
MD50529b9987af7ba27a1ac05bf76a2094e
SHA157948ff0ff2b1711433bef15ecb5658ba711b93e
SHA2560521ce1070503188787b48ff6215774f085644cd3c8731a01c8b0741d5532f6d
SHA5126b65014428a26aa0196d2dbdfb2c385779231ef82c9a5686292011acbd2ad4578f93c95e3ec419040bc8c1146201e873311968cd218fef920ce4f8be0036fe04
-
Filesize
395KB
MD5a04f690c526bbc9a1a8a9474ccf55b6a
SHA13905cd1b394778c3dc281de8b89ad0b0bddc9eed
SHA256b8f87d8aee50173089c18c4fdf906c1a8c45e2c7af54f0dbf4e3f8e9238397c4
SHA51211df9ddff4781f87e815c557323dcb2fb1f5fdec1c7bc036e9372a0c3008cb65bc14a573b8f0f76e728ce3a74d0f86d55b0d2364fa6ad73e74168549e76f1e30
-
Filesize
47B
MD572a392628d7f368bb9bc9689a694f55a
SHA1feacee9c66028a333446f2c968bcb3d567a4033d
SHA256afa60141aee93d7e3f3d8d296e36de9956f588a6cad99f8e79ce36ab88e828dd
SHA51276f40be7d3e0de960c7bc199fd094c64588841e5b6a1b99bd7fd2e3b53f9e381ded992ee6d67848dd4fda755416792ff6e29bf0acf1a348796dcf7e9bf96229e