Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
156s -
max time network
167s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 01:45
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-26_2d2685f10076126d0c398998111902d0_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-26_2d2685f10076126d0c398998111902d0_mafia_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-26_2d2685f10076126d0c398998111902d0_mafia_JC.exe
-
Size
255KB
-
MD5
2d2685f10076126d0c398998111902d0
-
SHA1
3d49798143638a11746a4242544cf051527d9f60
-
SHA256
40d1b1db66914ea21760f3cbdded1705cb5281c244caee6288fc046c8896e627
-
SHA512
7dcd82054c897a302c841c2ac0f1ff3a200ba8d044cbbdccdc2be81a5379b66a378faec5e19097a21d6b7f8ec28eee14226a16bacfc1d1910724533626269d29
-
SSDEEP
6144:o64tXafE0Mqpm+SKAqpByuqPoEbLvRdvf0:o68r0Mqpm+SCB3KbLzM
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Loads dropped DLL 3 IoCs
pid Process 1292 regsvr32.exe 2228 regsvr32.exe 832 explorer.exe -
Registers COM server for autorun 1 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1234066A-7A10-4CB5-ACCC-D9F1F06810CE}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Roaming\\MediaViewer\\plugin.dat" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1234066A-7A10-4CB5-ACCC-D9F1F06810CE}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1234066A-7A10-4CB5-ACCC-D9F1F06810CE}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1234066A-7A10-4CB5-ACCC-D9F1F06810CE}\InprocServer32 regsvr32.exe -
resource yara_rule behavioral1/files/0x000d000000012274-4.dat upx behavioral1/files/0x000d000000012274-3.dat upx behavioral1/files/0x000d000000012274-6.dat upx behavioral1/memory/2228-7-0x000007FEF65E0000-0x000007FEF664D000-memory.dmp upx behavioral1/files/0x000d000000012274-8.dat upx behavioral1/memory/832-9-0x000007FEFB6F0000-0x000007FEFB75D000-memory.dmp upx behavioral1/memory/832-12-0x000007FEFB6F0000-0x000007FEFB75D000-memory.dmp upx behavioral1/memory/832-14-0x000007FEFB6F0000-0x000007FEFB75D000-memory.dmp upx behavioral1/memory/832-15-0x000007FEFB6F0000-0x000007FEFB75D000-memory.dmp upx behavioral1/memory/832-19-0x000007FEFB6F0000-0x000007FEFB75D000-memory.dmp upx behavioral1/memory/832-25-0x000007FEFB6F0000-0x000007FEFB75D000-memory.dmp upx behavioral1/memory/832-26-0x000007FEFB6F0000-0x000007FEFB75D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 44 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{45615F2E-872A-4F2D-9A08-475EC8605622}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{45615F2E-872A-4F2D-9A08-475EC8605622}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{45615F2E-872A-4F2D-9A08-475EC8605622}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{45615F2E-872A-4F2D-9A08-475EC8605622}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1234066A-7A10-4CB5-ACCC-D9F1F06810CE}\ = "MediaViewerD9F1 Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1234066A-7A10-4CB5-ACCC-D9F1F06810CE}\Version\ = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3692066A-7A10-4CB5-AFF3-9DDE336E97AA}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1234066A-7A10-4CB5-ACCC-D9F1F06810CE}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3692066A-7A10-4CB5-AFF3-9DDE336E97AA}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3692066A-7A10-4CB5-AFF3-9DDE336E97AA}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Roaming\\MediaViewer\\plugin.dat" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3692066A-7A10-4CB5-AFF3-9DDE336E97AA}\1.0\0 regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1234066A-7A10-4CB5-ACCC-D9F1F06810CE}\Version regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1234066A-7A10-4CB5-ACCC-D9F1F06810CE} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3692066A-7A10-4CB5-AFF3-9DDE336E97AA}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{45615F2E-872A-4F2D-9A08-475EC8605622}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{45615F2E-872A-4F2D-9A08-475EC8605622} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1234066A-7A10-4CB5-ACCC-D9F1F06810CE} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1234066A-7A10-4CB5-ACCC-D9F1F06810CE}\TypeLib regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1234066A-7A10-4CB5-ACCC-D9F1F06810CE}\Programmable regsvr32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1234066A-7A10-4CB5-ACCC-D9F1F06810CE}\TypeLib\ = "{3692066A-7A10-4CB5-AFF3-9DDE336E97AA}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{45615F2E-872A-4F2D-9A08-475EC8605622}\ = "IMediaViewerIdentifier" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{45615F2E-872A-4F2D-9A08-475EC8605622}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3692066A-7A10-4CB5-AFF3-9DDE336E97AA}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{45615F2E-872A-4F2D-9A08-475EC8605622}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{45615F2E-872A-4F2D-9A08-475EC8605622}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1234066A-7A10-4CB5-ACCC-D9F1F06810CE}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1234066A-7A10-4CB5-ACCC-D9F1F06810CE}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Roaming\\MediaViewer\\plugin.dat" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3692066A-7A10-4CB5-AFF3-9DDE336E97AA}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3692066A-7A10-4CB5-AFF3-9DDE336E97AA} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3692066A-7A10-4CB5-AFF3-9DDE336E97AA}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Roaming\\MediaViewer" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{45615F2E-872A-4F2D-9A08-475EC8605622}\TypeLib\ = "{3692066A-7A10-4CB5-AFF3-9DDE336E97AA}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1234066A-7A10-4CB5-ACCC-D9F1F06810CE}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1234066A-7A10-4CB5-ACCC-D9F1F06810CE}\Version regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1234066A-7A10-4CB5-ACCC-D9F1F06810CE}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{45615F2E-872A-4F2D-9A08-475EC8605622}\ = "IMediaViewerIdentifier" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{45615F2E-872A-4F2D-9A08-475EC8605622}\TypeLib\ = "{3692066A-7A10-4CB5-AFF3-9DDE336E97AA}" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1234066A-7A10-4CB5-ACCC-D9F1F06810CE}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3692066A-7A10-4CB5-AFF3-9DDE336E97AA}\1.0\ = "MediaViewerPluginLib" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{45615F2E-872A-4F2D-9A08-475EC8605622} regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1732 2023-08-26_2d2685f10076126d0c398998111902d0_mafia_JC.exe 832 explorer.exe 1732 2023-08-26_2d2685f10076126d0c398998111902d0_mafia_JC.exe 832 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 832 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 832 explorer.exe Token: SeShutdownPrivilege 832 explorer.exe Token: SeShutdownPrivilege 832 explorer.exe Token: SeShutdownPrivilege 832 explorer.exe Token: SeShutdownPrivilege 832 explorer.exe Token: SeShutdownPrivilege 832 explorer.exe Token: SeShutdownPrivilege 832 explorer.exe Token: SeShutdownPrivilege 832 explorer.exe Token: SeShutdownPrivilege 832 explorer.exe Token: SeShutdownPrivilege 832 explorer.exe Token: SeShutdownPrivilege 832 explorer.exe Token: SeShutdownPrivilege 832 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe 832 explorer.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1732 wrote to memory of 1292 1732 2023-08-26_2d2685f10076126d0c398998111902d0_mafia_JC.exe 29 PID 1732 wrote to memory of 1292 1732 2023-08-26_2d2685f10076126d0c398998111902d0_mafia_JC.exe 29 PID 1732 wrote to memory of 1292 1732 2023-08-26_2d2685f10076126d0c398998111902d0_mafia_JC.exe 29 PID 1732 wrote to memory of 1292 1732 2023-08-26_2d2685f10076126d0c398998111902d0_mafia_JC.exe 29 PID 1732 wrote to memory of 1292 1732 2023-08-26_2d2685f10076126d0c398998111902d0_mafia_JC.exe 29 PID 1732 wrote to memory of 1292 1732 2023-08-26_2d2685f10076126d0c398998111902d0_mafia_JC.exe 29 PID 1732 wrote to memory of 1292 1732 2023-08-26_2d2685f10076126d0c398998111902d0_mafia_JC.exe 29 PID 1292 wrote to memory of 2228 1292 regsvr32.exe 31 PID 1292 wrote to memory of 2228 1292 regsvr32.exe 31 PID 1292 wrote to memory of 2228 1292 regsvr32.exe 31 PID 1292 wrote to memory of 2228 1292 regsvr32.exe 31 PID 1292 wrote to memory of 2228 1292 regsvr32.exe 31 PID 1292 wrote to memory of 2228 1292 regsvr32.exe 31 PID 1292 wrote to memory of 2228 1292 regsvr32.exe 31 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-26_2d2685f10076126d0c398998111902d0_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-26_2d2685f10076126d0c398998111902d0_mafia_JC.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Roaming\MediaViewer\plugin.dat"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\system32\regsvr32.exe/s "C:\Users\Admin\AppData\Roaming\MediaViewer\plugin.dat"3⤵
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:2228
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD59fa7a99426ff0e1b033e853860e1fe15
SHA1a3709ea214f89a8c66cf4c93ee5b843642d7dc24
SHA25622fa36641b0b4bf0e815fb986ac7626e6e8ebe06a2320789a9fb54063366ae46
SHA5122783a94f1c1a3b17355b054ebd054e9c892d8907d2fb97740da64fe6fc43670a390b48cee4aa734bad634d823415ab63bc2c45c100a966ede4a74edb1f58f3aa
-
Filesize
77B
MD5e941f1881fe271f9686cd53b7e15104d
SHA1b389b75756c610c80f9a323e854a20e1041d7218
SHA256379be2065a17c759600d226633ff35fae48f3f6ec91941f82e416c497131650f
SHA512cb49733016ddc16d4df87cf697758f9b8c404dd00df4bd91b90630eebaa8329e3ca20db29d5cbf81db095a85778e64c5fffb09c7c05dc5663a88fbb8171ae0b3
-
Filesize
95KB
MD59fa7a99426ff0e1b033e853860e1fe15
SHA1a3709ea214f89a8c66cf4c93ee5b843642d7dc24
SHA25622fa36641b0b4bf0e815fb986ac7626e6e8ebe06a2320789a9fb54063366ae46
SHA5122783a94f1c1a3b17355b054ebd054e9c892d8907d2fb97740da64fe6fc43670a390b48cee4aa734bad634d823415ab63bc2c45c100a966ede4a74edb1f58f3aa
-
Filesize
95KB
MD59fa7a99426ff0e1b033e853860e1fe15
SHA1a3709ea214f89a8c66cf4c93ee5b843642d7dc24
SHA25622fa36641b0b4bf0e815fb986ac7626e6e8ebe06a2320789a9fb54063366ae46
SHA5122783a94f1c1a3b17355b054ebd054e9c892d8907d2fb97740da64fe6fc43670a390b48cee4aa734bad634d823415ab63bc2c45c100a966ede4a74edb1f58f3aa
-
Filesize
95KB
MD59fa7a99426ff0e1b033e853860e1fe15
SHA1a3709ea214f89a8c66cf4c93ee5b843642d7dc24
SHA25622fa36641b0b4bf0e815fb986ac7626e6e8ebe06a2320789a9fb54063366ae46
SHA5122783a94f1c1a3b17355b054ebd054e9c892d8907d2fb97740da64fe6fc43670a390b48cee4aa734bad634d823415ab63bc2c45c100a966ede4a74edb1f58f3aa