Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28/06/2024, 08:06
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-28_b0f529f18e96d0f235b487bb57c9d0ad_mafia.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-28_b0f529f18e96d0f235b487bb57c9d0ad_mafia.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-28_b0f529f18e96d0f235b487bb57c9d0ad_mafia.exe
-
Size
906KB
-
MD5
b0f529f18e96d0f235b487bb57c9d0ad
-
SHA1
9a1c14bb79038c4041ee34a1f861db51e13571a6
-
SHA256
be8e34a735e8dafd2243995831ac80e36aaa1891cd5cca66649dffa2acbf9b97
-
SHA512
8fa633986daf64fce6a73b6e888f73045e9967de5ba507e6889dca242637053fc1c358e1ea059b3828075ba1fbb0435aa77131b031ae6ef14660fabf988257d7
-
SSDEEP
12288:+UHzKufgk0IpzpXxsPsM+80/9OCOaVLR7g1xGkgBaFSkYu8DU0OYhLu0O49gY4B:NHVfSIpzpBsGACO0LRs1kk6i6uKVOu4B
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1824 minidownload.exe 2848 DownLoadDlg.exe -
Loads dropped DLL 5 IoCs
pid Process 2132 2024-06-28_b0f529f18e96d0f235b487bb57c9d0ad_mafia.exe 1824 minidownload.exe 1824 minidownload.exe 1824 minidownload.exe 2132 2024-06-28_b0f529f18e96d0f235b487bb57c9d0ad_mafia.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 DownLoadDlg.exe File opened for modification \??\PhysicalDrive0 2024-06-28_b0f529f18e96d0f235b487bb57c9d0ad_mafia.exe -
Drops file in Program Files directory 32 IoCs
description ioc Process File created C:\Program Files (x86)\SogouDownLoad\DownLoadDlg.exe minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\dlbg.png minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\errorbg1.png minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\progressbar.png minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\errorbg2.png minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\css\downloader.css minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\error2.png minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\ico_close.gif minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\ico_spr.gif minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\ico_t.gif minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\warning.png minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\js\swfobject.js minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\repair.html minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\css\down.css minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\btn_spr.gif minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\ico_set.gif minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\rocket1.swf minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\crash\ExceptionReport.exe minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\attention.png minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\bg_line.gif minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\js\actions.js minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\js\jquery-1.11.2.min.js minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\config.ini minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\dlico.png minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\settings.html minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\error.png minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\ico_min.gif minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\download.html minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\btns.png minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\check.png minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\img_exe.gif minidownload.exe File created C:\Program Files (x86)\SogouDownLoad\html\images\rocket2.swf minidownload.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x000c000000012286-1.dat nsis_installer_1 behavioral1/files/0x000c000000012286-1.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2132 wrote to memory of 1824 2132 2024-06-28_b0f529f18e96d0f235b487bb57c9d0ad_mafia.exe 28 PID 2132 wrote to memory of 1824 2132 2024-06-28_b0f529f18e96d0f235b487bb57c9d0ad_mafia.exe 28 PID 2132 wrote to memory of 1824 2132 2024-06-28_b0f529f18e96d0f235b487bb57c9d0ad_mafia.exe 28 PID 2132 wrote to memory of 1824 2132 2024-06-28_b0f529f18e96d0f235b487bb57c9d0ad_mafia.exe 28 PID 2132 wrote to memory of 1824 2132 2024-06-28_b0f529f18e96d0f235b487bb57c9d0ad_mafia.exe 28 PID 2132 wrote to memory of 1824 2132 2024-06-28_b0f529f18e96d0f235b487bb57c9d0ad_mafia.exe 28 PID 2132 wrote to memory of 1824 2132 2024-06-28_b0f529f18e96d0f235b487bb57c9d0ad_mafia.exe 28 PID 2132 wrote to memory of 2848 2132 2024-06-28_b0f529f18e96d0f235b487bb57c9d0ad_mafia.exe 30 PID 2132 wrote to memory of 2848 2132 2024-06-28_b0f529f18e96d0f235b487bb57c9d0ad_mafia.exe 30 PID 2132 wrote to memory of 2848 2132 2024-06-28_b0f529f18e96d0f235b487bb57c9d0ad_mafia.exe 30 PID 2132 wrote to memory of 2848 2132 2024-06-28_b0f529f18e96d0f235b487bb57c9d0ad_mafia.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-28_b0f529f18e96d0f235b487bb57c9d0ad_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-28_b0f529f18e96d0f235b487bb57c9d0ad_mafia.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\minidownload.exeC:\Users\Admin\AppData\Local\Temp\\minidownload.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:1824
-
-
C:\Program Files (x86)\SogouDownLoad\DownLoadDlg.exe"C:\Program Files (x86)\SogouDownLoad\DownLoadDlg.exe" /ExternalAppInstall2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
795KB
MD51a21e9b1435c06e562a1c6a2e92a82d6
SHA160457394473cb75fca7d3fe5069231e82c84a4e6
SHA25635e9bfc9e668511572a1e41f9421b5bd931e1b66a0562789453690f306a9af8e
SHA512d4336ddc4969c19078c0b06ae799a9062c571de12f471cdc6fcc8f9d27e3f8aebe75a0de47eaf7f719c3a58f69d40f7c28a964ab88cd9ef2b566c73e0e9f3eff
-
Filesize
499KB
MD592611a7ef872df59c53eab1e76855a9d
SHA141351edd9c7a5587a2ba7793131205a8bc3896e8
SHA256b655815e0b129134ccebd00f44eb87f85e72eb37a1879509e90f539dda4600cc
SHA5121b07e6ef576751ee20e4d2c43031aa4d668b8dd3f58dd403db56fb9cce39c4c8646cb2c0268596c3df67f7fbbddefc017e5205f8f27612fb269caffa52536f0b