Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240319-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/04/2024, 12:43

General

  • Target

    2024-04-06_867a939a59bc1a3590f58915c4c7091c_mafia.exe

  • Size

    465KB

  • MD5

    867a939a59bc1a3590f58915c4c7091c

  • SHA1

    3db88610ba405e35bfaadd654f6820fb7c8b4718

  • SHA256

    5b081eaef8644b61d5f996360ab0b36b5fd8571cf40e3d8cbfdf1aabdae327c4

  • SHA512

    981739816ab20543fb0fb93abb99b8e7daf7460cb8dc5b0bc214c9f6d208a4898d93797e02b8de6df679507e7b51a3922d6c88fd73a734293ba3573fad4b18e9

  • SSDEEP

    12288:Bb4bZudi79LmHdZPLeutsZ3AB3eCYqnEG2A:Bb4bcdkLm9IDZQmkEG

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-06_867a939a59bc1a3590f58915c4c7091c_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-06_867a939a59bc1a3590f58915c4c7091c_mafia.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3124
    • C:\Users\Admin\AppData\Local\Temp\6699.tmp
      "C:\Users\Admin\AppData\Local\Temp\6699.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-04-06_867a939a59bc1a3590f58915c4c7091c_mafia.exe D7ECBD72BCC6134D0C97A45AF8C8F10F5DB56FE5375B2022213A6D69665564185F581A694270370BC21D064C5AC89C0F6F5BB9D9E98E14F1001D78C9D64E34D6
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:1292
      • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2024-04-06_867a939a59bc1a3590f58915c4c7091c_mafia.doc" /o ""
        3⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:4980
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4140 --field-trial-handle=2320,i,3025503729105798828,9325691672526736153,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:5808

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\2024-04-06_867a939a59bc1a3590f58915c4c7091c_mafia.doc

      Filesize

      35KB

      MD5

      a6b03fc9e5439b7504ba08010a960962

      SHA1

      e93a74f35ac1ed020158642eb1f2087fd31fc7c6

      SHA256

      b3b306a9618a08a003443e00e8ce2fcb14040775c3aeadc11cf120668e98dff1

      SHA512

      decbe4fa7eec0833a27acbde8b4de099124aa42e551f710fb615e6fc5aa0056ce9e44fc282e4930b1a669a1e012700b2c79cebc8a7b8ee4c66cfc29c800cddd0

    • C:\Users\Admin\AppData\Local\Temp\6699.tmp

      Filesize

      465KB

      MD5

      aafdad230b593d114739ea982ff21803

      SHA1

      a9ede92143764fbcb26288e3c743ba66d90f2211

      SHA256

      39335b6825529b79b691f616439cb7c4e5565291227fd236eef137b6130a1453

      SHA512

      40d6bd6a80da9f2fbb48ecaae11aa02c4cef0e1ff1ff826786494dc862598ace2d249cc1d34a189bf465c8dd42fb16b2d75025f02b99dba65c3d05360111f9a7

    • C:\Users\Admin\AppData\Local\Temp\TCDFBDF.tmp\sist02.xsl

      Filesize

      245KB

      MD5

      f883b260a8d67082ea895c14bf56dd56

      SHA1

      7954565c1f243d46ad3b1e2f1baf3281451fc14b

      SHA256

      ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

      SHA512

      d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • memory/4980-25-0x00007FF993AC0000-0x00007FF993AD0000-memory.dmp

      Filesize

      64KB

    • memory/4980-14-0x00007FF9D5EB0000-0x00007FF9D60A5000-memory.dmp

      Filesize

      2.0MB

    • memory/4980-17-0x00007FF9D5EB0000-0x00007FF9D60A5000-memory.dmp

      Filesize

      2.0MB

    • memory/4980-19-0x00007FF995F30000-0x00007FF995F40000-memory.dmp

      Filesize

      64KB

    • memory/4980-18-0x00007FF995F30000-0x00007FF995F40000-memory.dmp

      Filesize

      64KB

    • memory/4980-20-0x00007FF9D5EB0000-0x00007FF9D60A5000-memory.dmp

      Filesize

      2.0MB

    • memory/4980-21-0x00007FF9D5EB0000-0x00007FF9D60A5000-memory.dmp

      Filesize

      2.0MB

    • memory/4980-22-0x00007FF9D5EB0000-0x00007FF9D60A5000-memory.dmp

      Filesize

      2.0MB

    • memory/4980-23-0x00007FF9D5EB0000-0x00007FF9D60A5000-memory.dmp

      Filesize

      2.0MB

    • memory/4980-24-0x00007FF993AC0000-0x00007FF993AD0000-memory.dmp

      Filesize

      64KB

    • memory/4980-15-0x00007FF995F30000-0x00007FF995F40000-memory.dmp

      Filesize

      64KB

    • memory/4980-16-0x00007FF995F30000-0x00007FF995F40000-memory.dmp

      Filesize

      64KB

    • memory/4980-49-0x00007FF9D5EB0000-0x00007FF9D60A5000-memory.dmp

      Filesize

      2.0MB

    • memory/4980-50-0x00007FF9D5EB0000-0x00007FF9D60A5000-memory.dmp

      Filesize

      2.0MB

    • memory/4980-51-0x00007FF9D5EB0000-0x00007FF9D60A5000-memory.dmp

      Filesize

      2.0MB

    • memory/4980-52-0x00007FF9D5EB0000-0x00007FF9D60A5000-memory.dmp

      Filesize

      2.0MB

    • memory/4980-13-0x00007FF995F30000-0x00007FF995F40000-memory.dmp

      Filesize

      64KB

    • memory/4980-549-0x00007FF995F30000-0x00007FF995F40000-memory.dmp

      Filesize

      64KB

    • memory/4980-550-0x00007FF995F30000-0x00007FF995F40000-memory.dmp

      Filesize

      64KB

    • memory/4980-551-0x00007FF995F30000-0x00007FF995F40000-memory.dmp

      Filesize

      64KB

    • memory/4980-552-0x00007FF995F30000-0x00007FF995F40000-memory.dmp

      Filesize

      64KB

    • memory/4980-553-0x00007FF9D5EB0000-0x00007FF9D60A5000-memory.dmp

      Filesize

      2.0MB

    • memory/4980-554-0x00007FF9D5EB0000-0x00007FF9D60A5000-memory.dmp

      Filesize

      2.0MB

    • memory/4980-555-0x00007FF9D5EB0000-0x00007FF9D60A5000-memory.dmp

      Filesize

      2.0MB