Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/04/2024, 01:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-23_0b92147c7be4916b81686d6ef5aaf5cf_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-23_0b92147c7be4916b81686d6ef5aaf5cf_mafia.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-23_0b92147c7be4916b81686d6ef5aaf5cf_mafia.exe
-
Size
486KB
-
MD5
0b92147c7be4916b81686d6ef5aaf5cf
-
SHA1
2c45fb724dbf81adfab2acbf38dd06b00a4e2cf7
-
SHA256
a0a31e57410db248b7744018087045b3bcc86aee82f6db32d9322d0d753d49b1
-
SHA512
31dc791aac4e4cb8de61d423cb023d0d5f8fc22cfaad93dfae65fcda5812d6cd72606e16cdd5df9288baf0908bd9e28320e46a5bdd65a45991520e69ec1303f7
-
SSDEEP
6144:pRPu8zwvAZsCZrIik3tHDvBE+2qgrYhpT00ZiKNvHyyRZiaafI9sH2fB:pTrIik35BE+R8YnpiuvroVUB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2364 9CDB.tmp -
Loads dropped DLL 1 IoCs
pid Process 1908 2024-04-23_0b92147c7be4916b81686d6ef5aaf5cf_mafia.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2488 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2364 9CDB.tmp -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2488 WINWORD.EXE 2488 WINWORD.EXE 2488 WINWORD.EXE 2488 WINWORD.EXE 2488 WINWORD.EXE 2488 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1908 wrote to memory of 2364 1908 2024-04-23_0b92147c7be4916b81686d6ef5aaf5cf_mafia.exe 28 PID 1908 wrote to memory of 2364 1908 2024-04-23_0b92147c7be4916b81686d6ef5aaf5cf_mafia.exe 28 PID 1908 wrote to memory of 2364 1908 2024-04-23_0b92147c7be4916b81686d6ef5aaf5cf_mafia.exe 28 PID 1908 wrote to memory of 2364 1908 2024-04-23_0b92147c7be4916b81686d6ef5aaf5cf_mafia.exe 28 PID 2364 wrote to memory of 2488 2364 9CDB.tmp 29 PID 2364 wrote to memory of 2488 2364 9CDB.tmp 29 PID 2364 wrote to memory of 2488 2364 9CDB.tmp 29 PID 2364 wrote to memory of 2488 2364 9CDB.tmp 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-23_0b92147c7be4916b81686d6ef5aaf5cf_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-23_0b92147c7be4916b81686d6ef5aaf5cf_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\9CDB.tmp"C:\Users\Admin\AppData\Local\Temp\9CDB.tmp" --helpC:\Users\Admin\AppData\Local\Temp\2024-04-23_0b92147c7be4916b81686d6ef5aaf5cf_mafia.exe 9C7DA93EECD890C64475A7313E66800BE18907ABE4439DBFC1FE4A95E9AD3F18A4F81A927C3A65CD8E6120DA00D8671CF7ADD3D9A760ADDBCB2B0B137465EE3F2⤵
- Executes dropped EXE
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2024-04-23_0b92147c7be4916b81686d6ef5aaf5cf_mafia.docx"3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2488
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD57079891932a64f097abafd233055a1e9
SHA1246d95feafe67689d49a5a4cadba18d3ac1914e5
SHA256c97189b50e5e92be09966d4732b6d61a2e435b2935d60c09989e555ae442e7a1
SHA5126e9ee6427d7cc2474dc634b088cf3f35d06dfb734d2b63fbbc794f4083b4b5754379daff4804bf5024b1b430aa5e50fa6d839d3473ceeed3043d373c85e9862a
-
Filesize
486KB
MD59b0461c19c558960c89f0efb40b888e7
SHA16d1da57d1920b03aa43f318a009d1cc007e0601e
SHA256ef72c7922d302861e3939beb16d14e7461e9df3805e9ea9c2be5b89293aab630
SHA512398ccfb8c497828ea00e8e3f7b5c8a40edd4e8f82f5fb4ceaeb1b0f0814565072973032e9c639f8b40750fd5dc1462d58def8e5919cdcbbe0f663f3ef6ba2cf8