Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
09/02/2025, 10:38
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-09_e0cd9fbbcbe2481f1d959855e52aab59_mafia.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2025-02-09_e0cd9fbbcbe2481f1d959855e52aab59_mafia.exe
Resource
win10v2004-20250207-en
General
-
Target
2025-02-09_e0cd9fbbcbe2481f1d959855e52aab59_mafia.exe
-
Size
13.7MB
-
MD5
e0cd9fbbcbe2481f1d959855e52aab59
-
SHA1
ab6f1732b26b63547eeeb506651705d022bea5d5
-
SHA256
88a7ec735e3cbe569b3e28087a92d646e08532291e13217834815edf89235054
-
SHA512
e14f4b503991387d3601597b66842c1aed700b1128845a84ac9a22ac7dbc889da33fd2fc7e889845f25039adb3c397d4775662a84a0bd300e79c4a70d54cdad6
-
SSDEEP
393216:XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX7:r
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Tofsee family
-
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2596 netsh.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2904 sc.exe 2684 sc.exe 2852 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-09_e0cd9fbbcbe2481f1d959855e52aab59_mafia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2632 2100 2025-02-09_e0cd9fbbcbe2481f1d959855e52aab59_mafia.exe 28 PID 2100 wrote to memory of 2632 2100 2025-02-09_e0cd9fbbcbe2481f1d959855e52aab59_mafia.exe 28 PID 2100 wrote to memory of 2632 2100 2025-02-09_e0cd9fbbcbe2481f1d959855e52aab59_mafia.exe 28 PID 2100 wrote to memory of 2632 2100 2025-02-09_e0cd9fbbcbe2481f1d959855e52aab59_mafia.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-02-09_e0cd9fbbcbe2481f1d959855e52aab59_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-09_e0cd9fbbcbe2481f1d959855e52aab59_mafia.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\kvyramac\2⤵
- System Location Discovery: System Language Discovery
PID:2632
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\mvpumlgc.exe" C:\Windows\SysWOW64\kvyramac\2⤵PID:2756
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create kvyramac binPath= "C:\Windows\SysWOW64\kvyramac\mvpumlgc.exe /d\"C:\Users\Admin\AppData\Local\Temp\2025-02-09_e0cd9fbbcbe2481f1d959855e52aab59_mafia.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2904
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description kvyramac "wifi internet conection"2⤵
- Launches sc.exe
PID:2684
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start kvyramac2⤵
- Launches sc.exe
PID:2852
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2596
-
-
C:\Windows\SysWOW64\kvyramac\mvpumlgc.exeC:\Windows\SysWOW64\kvyramac\mvpumlgc.exe /d"C:\Users\Admin\AppData\Local\Temp\2025-02-09_e0cd9fbbcbe2481f1d959855e52aab59_mafia.exe"1⤵PID:2856
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD584f23b977f3cee6069b07deb7721ed69
SHA12d1f999bd539c79dc79015bdcec3b5e0f166594a
SHA2563ff56b11470d3740a79e2dbe37c5ba80b57c8933b07a0dfd2d67a66fd4064168
SHA5121c7210f9e37bcd9db3af3681652f4fa476dfb50308a4e563329e9346b864a14761abddeef0cd40667f7e80e9357c7841b0328a2be71b597474f4a02ffbf258d4
-
Filesize
3.2MB
MD5610e83a0c8510cbf5b317f9ed8bd23e0
SHA167f3fa070e1b0bb3093d56a669e4fecc233337ba
SHA25682dbd3db1e2217d013ab460edad4c9e5d0fe09b8fffa5d2308b25d237e29141f
SHA5123cc2d2a682499e26b34507ab753ad473b9f3f69f94dd681e72ced10da8d64b3520330a82cef11a854a9182f01979a89f7032f4473db90948d816a266a19dc50b