Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
2025-02-12_d42fc258c075d0a348732e1c5add285a_mafia
-
Size
12.4MB
-
Sample
250212-1ca8gaylcn
-
MD5
d42fc258c075d0a348732e1c5add285a
-
SHA1
d5fff320f7fcb7709ced5ef7d075f32d18a6a474
-
SHA256
344d1f58e5c289a4a9fb84e1a55a938ef1647c1f88a03c59540d503f931a29ff
-
SHA512
1d90d99a4b1a5ef5957a45bde72c6b811fdd578459d028cdc6ee875989472d90c1e4682f76aa062a6b9c99319314078c26edd86e5eebb74c5b515feba8d21c82
-
SSDEEP
24576:ipomTTN9tttttttttttttttttttttttttttttttttttttttttttttttttttttttP:Goo9
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-12_d42fc258c075d0a348732e1c5add285a_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-02-12_d42fc258c075d0a348732e1c5add285a_mafia.exe
Resource
win10v2004-20250211-en
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Targets
-
-
Target
2025-02-12_d42fc258c075d0a348732e1c5add285a_mafia
-
Size
12.4MB
-
MD5
d42fc258c075d0a348732e1c5add285a
-
SHA1
d5fff320f7fcb7709ced5ef7d075f32d18a6a474
-
SHA256
344d1f58e5c289a4a9fb84e1a55a938ef1647c1f88a03c59540d503f931a29ff
-
SHA512
1d90d99a4b1a5ef5957a45bde72c6b811fdd578459d028cdc6ee875989472d90c1e4682f76aa062a6b9c99319314078c26edd86e5eebb74c5b515feba8d21c82
-
SSDEEP
24576:ipomTTN9tttttttttttttttttttttttttttttttttttttttttttttttttttttttP:Goo9
-
Tofsee family
-
Windows security bypass
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Creates new service(s)
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Browser Extensions
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
6