Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 19:14

General

  • Target

    2023-08-26_186bd3449422b4a0c6db7d28d86019a7_mafia_JC.exe

  • Size

    367KB

  • MD5

    186bd3449422b4a0c6db7d28d86019a7

  • SHA1

    5ad2566a99f73e6c8fa1b165ec71605a4c72991d

  • SHA256

    ae31fc247034b9021268f93b02a1c8b710e1fb52eaabe093aba12f59942a1997

  • SHA512

    18576a3a67e2a1361721669522174d9860c599f1f818b5bc1fabfba4b8244a6f1504c9f02f6e93602fff1bf0b55ca40657a7c371cc6510515b167a049378b6f9

  • SSDEEP

    6144:vNgF4DxNuJc06j4YBa77xMQxA5i5knmv1SL/mQXCk47l5Olw8l:vu4lNAtYytvS5Aku1YLClN8

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2023-08-26_186bd3449422b4a0c6db7d28d86019a7_mafia_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\2023-08-26_186bd3449422b4a0c6db7d28d86019a7_mafia_JC.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4192
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://skjp.zcjczj.cn/ds2taob.html?s=92&v=93&c=94&a=376&m=&t=1614299382
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1764
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1764 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\1T6973M5\ai.taobao[1].xml

    Filesize

    169KB

    MD5

    42c6e2e79a76b6dcaa4e017e29942af7

    SHA1

    804ca5bf1a95ce400a734c1ab35520efc68740f9

    SHA256

    97eb0c516bdd00311265fa3af141ae357e7af993e5fe0a28cb0f53c2412d94b2

    SHA512

    65cf19be56ebbf2a8267eefd1c3094e25c129521651fc7ae3bdf6458955cda8dd566800966b9f39a8b751a7d424585ea9f92ca43dff0e7ec62ea63681449dfcd

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\myqr27u\imagestore.dat

    Filesize

    1KB

    MD5

    b47e0b93031a49f4d54ef0bd6a78e558

    SHA1

    94bcd6cd976a5221339ac81c6547008d4fd145ec

    SHA256

    f00dfdda0d956b0f7b25b4b8e14010f677f732af25a929e306e49d28df86a105

    SHA512

    a1f81108c0948018f5a5f99a2a268852e1ed3f84309e427acb258e4834e6204e1e98a124ae9dfee0358eeb5285c991356b7bc45ce634692c6f1a2511500565db

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\1RORH6TK\TB1PlWbKFXXXXbmXFXXXXXXXXXX-16-16[1].ico

    Filesize

    1KB

    MD5

    fb44dc89394b9c62bf847ee420eaf4b3

    SHA1

    af32d2a4d2213d734cca7ddf0ad309ba0fd2a3b8

    SHA256

    f238445369d41b33020f76c8adaa5774cebeab5045d6ef90c459b68ad1304143

    SHA512

    42849e934319aa28b46a07680d36ae00b83f26f42e61e7c1e5bb1e8f49f381393f0d4d93a9dbb54d7a7126ddb02951ae008d4687efdb6ee0dada6d14eb4cde83

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\1RORH6TK\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee