Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/02/2024, 03:31
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-29_43ecaf2ea801b2bd2644fafc11852016_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-29_43ecaf2ea801b2bd2644fafc11852016_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-02-29_43ecaf2ea801b2bd2644fafc11852016_mafia.exe
-
Size
295KB
-
MD5
43ecaf2ea801b2bd2644fafc11852016
-
SHA1
822d89021fb39d28ec24f17c54f8071f465ef400
-
SHA256
47cefd88c96ee26a898c38e018208ad088fae3d08e0f8f54e2b979cfab203e28
-
SHA512
84647b169bbe67c231c94da0b56aa208e56c740248b2b40f193d5bf54fc081f55f776ba82f2768c5b5477b489ca84807cba78f1e588b45f4b0fa17388296d841
-
SSDEEP
6144:irwMKNS04IDKVqBMEkem+Vv0nQSDWicCfyUzc0BSCf2P:1tN10quOpv0nhDcCfjci+
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20b7322bc06ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1761B751-D6B3-11EE-9502-E299A69EE862} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009d182698a4727943a65bc6c9ecfd0fc5000000000200000000001066000000010000200000000259b8f1a3a3e815f8c67f8352ae56c90cd3301413bbac8a5a064d726b24d0b4000000000e8000000002000020000000cf166f5229d3cd93fb7aff803cdefadf167ebed8354a56f8bd718b19e65feb232000000086bc8d8f5bb06cde7dc3dc4694596171f6bd6ddb1e5c43e89071793ce0ef92424000000089f9b27e3b8c5cd1a70ac13b40ed4c1276c1d295438d27efe92242f6aa7d48f2180a34193bf2413583a132d4789e7bf64aee22ba1964d59ce8c35777b97f4c9c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "415339386" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2236 iexplore.exe 2236 iexplore.exe 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2236 2220 2024-02-29_43ecaf2ea801b2bd2644fafc11852016_mafia.exe 28 PID 2220 wrote to memory of 2236 2220 2024-02-29_43ecaf2ea801b2bd2644fafc11852016_mafia.exe 28 PID 2220 wrote to memory of 2236 2220 2024-02-29_43ecaf2ea801b2bd2644fafc11852016_mafia.exe 28 PID 2220 wrote to memory of 2236 2220 2024-02-29_43ecaf2ea801b2bd2644fafc11852016_mafia.exe 28 PID 2236 wrote to memory of 2548 2236 iexplore.exe 29 PID 2236 wrote to memory of 2548 2236 iexplore.exe 29 PID 2236 wrote to memory of 2548 2236 iexplore.exe 29 PID 2236 wrote to memory of 2548 2236 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-29_43ecaf2ea801b2bd2644fafc11852016_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-29_43ecaf2ea801b2bd2644fafc11852016_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://skjp.zcjczj.cn/circle.html?s=&v=93&c=94&a=71&m=&t=16096434912⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2548
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b8ec733bcff6943db2f53381d8c9878
SHA1ba4fa4c49b21727596bac1b4ed8f8f13bb0460ab
SHA256b8e05ef34be7a768c21145b77dc1d0ff46b05683dfba1bca752a565e193d042a
SHA512cc6515ae3a81238d3169b0c86eaa2e54fbec55bd8793e310e873a5d91cebf981f619614a475fd10cb63cc3c79d39c49a11762269c0aac40eec6bed30308fee4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561bb20958cd3cca886ee5dc2a34a9baf
SHA1a00f30344e896011f0f5a30a9469ef16a872aca7
SHA25692960a5390234db70dd3efe59d3864e1245923b3ff7bc2f844bd572a4b6f8b7c
SHA5126e989bcdc0ce82840aa1f9de50eff5f6bfbba96a7216abf8fa8010afcf54be6a8c1c9397b43642dd4f1e57d82db037ffe1d3964fa52a3fa0911fd8d8d0a2468b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5a1304cfcbd3e35db877661a4eb51b3
SHA1f35219c20d1b0f0d0654121b808325c77d519638
SHA2565899d1bfc8669ba6534066dd23f43dbe2d6ce561462921aaeda78a6cd5d773dc
SHA51234f9a86f7c60b4fc3a7b4af5ced2c597e8064aebdaf9917740ba870828a6909f8953d7d645da2a8f48e74feae5793d11db76d07c1389164a14c261bb2983b3b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f725827d1eaae50444856060b5daf8d0
SHA1a2def626ec5d8ea52ea84cc10c1aca8b8f0253fe
SHA256b30210bb259da17ac92a555bc4769167c0357aa30255e0d7cbfe8530bba5148e
SHA512af942d239889cb05f11baeca44ca8a2797a03c33812387c046c6a15c75a28ab1c9b87e5dc29a6aca1736fe1a0a1c4fa6a5e6ae1d523ee71b668b455d50620483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53db6f2621cc7913bf8de064fb9f209a4
SHA178ad2f74903ffd4f95f07c1fea78fa0c2cb19d3b
SHA25675fe6dbde1670cf64f5668f8f0bdebe3c84d5f52e6be443b62e55ac578242c3e
SHA512b01a0d36772d9d62ca30a62912a8f9771e47e744f467d7eecdf50c0d61d9724bf9ee0b05be4453913454230f8fe0b2e70e5d6fce9c4acb4ed1cde5b7149b69c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d628e838ca9e0133cb150c27706a9548
SHA1abcbdb4dd68d25bba655b3c7fddd66b7c27a51f1
SHA2568b9941c2e0ba978260bfabb12fcba085fa03a1c3d8fc5c0aef40d223cec3626e
SHA512229c9aa449671a3e0c81f7c4e03af8d416ef75df34efc686fa96c07f3ee019757daabf98da16cab33b81a13d863f37fe063dceda1ff63277c2a0d5350507dc6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5293dc538b5b98d12b460f90732d80819
SHA1f499653575cf8b2d868f0ff5b7536e169838564b
SHA2563e88ad18e302ee1c8af65115161b313ada632632c329d0c815734e1d08afb69d
SHA512982c988df57f054437f74d29ff06f418f0510c7271f290e60e973b68058bd0c6ae27f179f09e18570485ab0560a116edb9535eff5a5a671907cec2b1a424facd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1e9fd5819a9584b5c151418d7621d20
SHA10977f5e74a9fb9a6e8be762df0c1e6037f48701d
SHA2566911e78beb78dd471a96bd1fe5f33edfede5c72c90950803e78985428650a3f6
SHA5126bdd262964c54de4b34ab4c9d1ffe626380e3b1bb091d0785bb9fd2a094c9da5d2120e90d19a8e4d281404516fb360aea1de19974ba9b3596ea8de26e352a250
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ebdcdabc5525d06b2a5baad180593f8
SHA179f5d64adb1af64e1b4e2e071c4facfa722de263
SHA25604bfb62db427070333f9e6306d88ea74550a491246901824c57fd3e38def36fc
SHA512fa647b10a03bc3f11b273dc4d849b52df68e8e04ef28b2483a5c3dc724df114176498c51b7971fd15c1d1d2be9115b5292d9e0c4e3528e3a693d4cda3a943db6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ae4683ebc0feaa0b3af36cbc0789b30
SHA15559b4be4b9a612ede2ea58d675a699d338e3fcd
SHA25650dadd6a8e3e88a8b69116520b4dd0f916e2921f995b9c6ffaf1418c61de821b
SHA51227b59dabbb1a49903bed75b843d950f8aaff78917e40cbd98a4b1bc60b59aaebcd44f624102594c7483ad1f94f7ce1dc6eaadda2ed58fc436f93148acc40e39d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591a37707b47614d1d9b79fb38a729aab
SHA1cbf09491bb98f2c104a8d7f9ff4850c22d2213a0
SHA25655ed60997fadef1c09197201875e3c04394ec8a5f9b828506451c8cf20154ef2
SHA5129633be9d1ff489404ab55062a86a7bbe9bd4b23ad4d8cb8f8ea16595ee1c305333cedef05ed70846c0870a4738e9377af0a8d7b9bffcc7405c65d1548b003613
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f3b57699f75853b376c3bd382ef1605
SHA1e5929eae00d51307531b36d5a37734438332d117
SHA2563ff873390c4faf4eedcca9f49e61233caac1d039fa8dab78593c0eb907705ead
SHA512aafeca4722041ac78b2c12cfb90e390d3fb3c216d2f06bc98749c4298ed27720d6fc1a1e4607554f8d2bf266e1993e0035d35a171f0ac830ddb932ae32f61017
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5558731f794b964ba5bdf3117d951f5a9
SHA16a5951b27fceada5f4a4da77261410b23b5ff0c0
SHA256a8ccdf649d365d176ccc9a732304bb854f124e952331938e42ea6455b2b6a40a
SHA512eddf5347ce00987ff808cf388a8c6cc83b5fd7a1de639d804ce0b0a938a86e5183a2abb24470a172a16fbf7384b9dac4e62c22bb6ad14152ea70f4f7260847d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5219320357f17c1001206f55d5199de7a
SHA1fe4b29abe2023b56767933884a69582a2dcb7b41
SHA2564ad844f457fa734c78215190357b0b75902dd249fc656bd5fb8bf9e35f6a2a14
SHA5120db2d03654fdf4dafd954beda1e5756bed1e111045e181d1e3375630794c70518b3357d3d6ed72af2984bf8803c3b9a85f623a92369ff82524338868f11dcb69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c1f5fc2423df303f7d1697ac0894808
SHA19df87f9be4cab9ea4295692fd3f1094972c394e1
SHA256915449af7ccdf1b17aec3c3be4d6e531133ad912a464c3c028d752927f26175d
SHA5125a5fe4fc6839969047890b56543118231b840f89390653c9887cd198b1ec290927033706266be86101fdcca2276a95ecc011566bbf3d157cf09a093ce2bc824e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e033bfd4fd9a4b7f1593347e93e1077
SHA1689cd70b023e74395dcecc071bc955b515efba4e
SHA2563b751e2a65551d311563823c3a713a1e1070091efcbabea665ef63a1fe4da81a
SHA51246fe93d6b2655f55d553270583349c5c0de433b5672f5f1125d5f869b3958e29163e24f53fddfd4ffae5b1b79b008b9832fdcdd137211827511e553dad32fbb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a056ef50b71732fcb900191ef38ac3f3
SHA1a0a349212082dfc5af1a7c386837758b4075b94d
SHA256ec8a7e34875cb4cdb30131d1e5be06808b4049fbe22e55bd52c1ca5454167ec0
SHA5122aa12adcab1cb521196b67d55725fb7f913d686292d555a05491d9e41514960da977c72dd427a9175a771b14d7840bbcb03e6bbff1eb07bc8b4f259a61586113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557dc368c373f301597cb87ac872ece4b
SHA14c0974b686c38f0b9e0e9e17ebfcd58063d9e271
SHA256e5915c240549b44a6251b0d9dd662cebf21aef3eb1cd339d2bb892f1e0d4a0d4
SHA51254143b2882ebad7e424e6fd7e38780cce83a336549a4bd4d7be6dd05b7ecebfcae7dbafc1176a2fa4fda9d039e3008fce84d3d55e1053ed3c74c69206f54c332
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63