Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/03/2024, 13:53
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-28_c2347d8a3e52a27de85563317388616d_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-28_c2347d8a3e52a27de85563317388616d_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-03-28_c2347d8a3e52a27de85563317388616d_mafia.exe
-
Size
462KB
-
MD5
c2347d8a3e52a27de85563317388616d
-
SHA1
d5a8520116ef92053a21433488098ecbe15b5b7e
-
SHA256
0bca39933ff8941c0951974ff2b64b31b4c2da58f99e12f98ec860ad1fb00ddb
-
SHA512
4f53741082740869a47bdae264f43cdcde402509db486ee9eea89bd199b5d0ac41cfe69cd3d41c687014bd6678762f2fdfa01a95ab7c27832595b461c6031661
-
SSDEEP
6144:0A4psmawWIrFUJe5X8bbUpxOZgu7iHVDBnon8Q9KV8Yu0hNNXT/Je2W306sHZi:0oJe5X8b4/Vanj90Bu0v2G5i
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2228 4A1A.tmp -
Loads dropped DLL 1 IoCs
pid Process 2336 2024-03-28_c2347d8a3e52a27de85563317388616d_mafia.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1844 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2228 4A1A.tmp -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1844 WINWORD.EXE 1844 WINWORD.EXE 1844 WINWORD.EXE 1844 WINWORD.EXE 1844 WINWORD.EXE 1844 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2228 2336 2024-03-28_c2347d8a3e52a27de85563317388616d_mafia.exe 28 PID 2336 wrote to memory of 2228 2336 2024-03-28_c2347d8a3e52a27de85563317388616d_mafia.exe 28 PID 2336 wrote to memory of 2228 2336 2024-03-28_c2347d8a3e52a27de85563317388616d_mafia.exe 28 PID 2336 wrote to memory of 2228 2336 2024-03-28_c2347d8a3e52a27de85563317388616d_mafia.exe 28 PID 2228 wrote to memory of 1844 2228 4A1A.tmp 29 PID 2228 wrote to memory of 1844 2228 4A1A.tmp 29 PID 2228 wrote to memory of 1844 2228 4A1A.tmp 29 PID 2228 wrote to memory of 1844 2228 4A1A.tmp 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_c2347d8a3e52a27de85563317388616d_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-28_c2347d8a3e52a27de85563317388616d_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\4A1A.tmp"C:\Users\Admin\AppData\Local\Temp\4A1A.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-03-28_c2347d8a3e52a27de85563317388616d_mafia.exe 4AE0D629D6086EFAB4338762E9FD9EA903640F4B1AB03304F755DF183DEAAD9A43924DCDBB80B0789C169B597BA067F003C7E85ACC7E8623A04DB3C17E423F2C2⤵
- Executes dropped EXE
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2024-03-28_c2347d8a3e52a27de85563317388616d_mafia.docx"3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1844
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD57079891932a64f097abafd233055a1e9
SHA1246d95feafe67689d49a5a4cadba18d3ac1914e5
SHA256c97189b50e5e92be09966d4732b6d61a2e435b2935d60c09989e555ae442e7a1
SHA5126e9ee6427d7cc2474dc634b088cf3f35d06dfb734d2b63fbbc794f4083b4b5754379daff4804bf5024b1b430aa5e50fa6d839d3473ceeed3043d373c85e9862a
-
Filesize
462KB
MD5a66bf25ec437904b69c99c0d8f31d105
SHA10131db91fc887315e3b474134a0d0c925f3541db
SHA25660706914b7cba7138a064f382fb7e2a275b43c110411bcf77a99b3215d2fff25
SHA512ec0c5fc7840a693317287c4210a775b04208f6897d7d68985da5bfb665ee828de57e5e3b77d40c9a86ca90acf7873b4ccad56a493013720ce5d3614986ee714b