Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    26/03/2024, 02:40 UTC

General

  • Target

    2024-03-26_5dc0335d13d0e3684e68f4126f3d713d_mafia.exe

  • Size

    462KB

  • MD5

    5dc0335d13d0e3684e68f4126f3d713d

  • SHA1

    a1b07702976f8a9b45e681bcd914079d77e99460

  • SHA256

    f28bb8629a24bf383ddb5c765221d7539f97afce82d60a4131f8ae342ec37fbc

  • SHA512

    c851cdb11594575362a0b9acdc00bbcaa552925a2a42c082c80064949a57e14911affc58db8e75d32811d22a06d3f48d0429e6346ee45f9b86cbd897bb623265

  • SSDEEP

    6144:lA4psmawWIrFUJe5X8bbUnskLa833y45woFnn3DnhnIRT5jcIpM/3nsHOj:loJe5X8bJkLaoWOnn3DnZIRVjxS/cuj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-26_5dc0335d13d0e3684e68f4126f3d713d_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-26_5dc0335d13d0e3684e68f4126f3d713d_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2092
    • C:\Users\Admin\AppData\Local\Temp\10D2.tmp
      "C:\Users\Admin\AppData\Local\Temp\10D2.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-03-26_5dc0335d13d0e3684e68f4126f3d713d_mafia.exe A5149166F8C6A405B005BB0EBCF3DDFA9899941CDBD96E49588F166674C9557912E075815B68F36E0A57F9566FA21B4E7671CE1F51D602049F3227B8FD4C87A2
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:2580
      • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2024-03-26_5dc0335d13d0e3684e68f4126f3d713d_mafia.docx"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:2528

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\10D2.tmp

    Filesize

    462KB

    MD5

    64fed27644a49efaf40f2acbfb9f8c01

    SHA1

    30cfdde2106e5cda65a249b7bfd91de776ee5c90

    SHA256

    cd09754c1052b8a6a016d2f6f9db0ea93797129f2b350d2c81b493290832a2e2

    SHA512

    6f6057edb3652fc68e3139a1be29942d436ef81a27a10596bda6cfd012ed4e43cdd4f3a3602bcc8a55b0ae3ebd6c6543cc9d8c494476c784b761139537b66e54

  • C:\Users\Admin\AppData\Local\Temp\2024-03-26_5dc0335d13d0e3684e68f4126f3d713d_mafia.docx

    Filesize

    140KB

    MD5

    e90e498009a13ae957dcde4e01065e7d

    SHA1

    dcb4cc9b7d1ed3becc625597422d60aaf068a759

    SHA256

    ca91bbd477e2a516997c48dde3da1a5eae4cad86ca664fea54f0103739073c94

    SHA512

    4d0868f653e6c57d4011430ab81688f4f039550a9a0b5b1ce5ab1a695cb1dca7d7cdfb1d7c3920c35bbd3a8b441c820f00ae4e71f749650545ddd6894d597766

  • memory/2528-7-0x000000002F721000-0x000000002F722000-memory.dmp

    Filesize

    4KB

  • memory/2528-8-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2528-9-0x00000000710AD000-0x00000000710B8000-memory.dmp

    Filesize

    44KB

  • memory/2528-13-0x00000000710AD000-0x00000000710B8000-memory.dmp

    Filesize

    44KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.