Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/07/2024, 01:25

General

  • Target

    2024-07-11_cb6502d347e66ad00df8d61f2bff373d_mafia.exe

  • Size

    7.5MB

  • MD5

    cb6502d347e66ad00df8d61f2bff373d

  • SHA1

    36edfd1489b637c9605f7f3121d9953a0f0cee5c

  • SHA256

    1f9ba4adb9f568997316645d1210d582c433321eec50e0348561efc65277001e

  • SHA512

    7c29b49d159e57168af0a9d6247d1f13b291b54e47c29e49b4c0f95259c578f17505ec589541ade63f0b9dca79e9efe5b9838239291f2a0cc19d5da034641e81

  • SSDEEP

    196608:FYE0SCI4rbECIwBbiL4c7RcXYP0a5Lp/3/PXCt40+isGsaNk:FYn/8ChhoFhPPXYtbjNk

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 36 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 27 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-07-11_cb6502d347e66ad00df8d61f2bff373d_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-07-11_cb6502d347e66ad00df8d61f2bff373d_mafia.exe"
    1⤵
    • Checks computer location settings
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2852
    • C:\Windows\SysWOW64\PING.EXE
      "C:\Windows\System32\PING.EXE" www.baidu.com -n 2
      2⤵
      • Runs ping.exe
      PID:2688
    • C:\Users\Admin\AppData\Roaming\MyMacro\WeChat.exe
      --host_id 3 --verify_key mDB62xZNEZ60 --product "C:\Users\Admin\AppData\Local\Temp\2024-07-11_cb6502d347e66ad00df8d61f2bff373d_mafia.exe" --version 2014.05.17762
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2368
    • C:\Windows\SysWOW64\PING.EXE
      "C:\Windows\System32\PING.EXE" www.baidu.com -n 2
      2⤵
      • Runs ping.exe
      PID:3100
    • C:\Windows\SysWOW64\PING.EXE
      "C:\Windows\System32\PING.EXE" www.baidu.com -n 2
      2⤵
      • Runs ping.exe
      PID:1528

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\boost_interprocess\JLWif_HzJGl

    Filesize

    258B

    MD5

    79e2ab7f7505d31f1eb969b890eb24be

    SHA1

    eeabbd70fb7339a972a471372537fad172fe37fa

    SHA256

    4f6a655ae737853cfe2320b2ff854c583b57eaefafc1e9f08a6faf3dacb233ac

    SHA512

    5c18b262596b6f67192fecaea0659be4dae0d6bcea325a7c287c1902a51d172d467c9f69c13f1b7431af8795373e2fb071a9e7a86e46a84fc8367a04327f13b4

  • C:\ProgramData\boost_interprocess\JLWif_HzJGlB

    Filesize

    256KB

    MD5

    ce80a00a46a260f471cd6771ffe2dd9a

    SHA1

    9919c9d850132b90d16c579c995494dedcb3083b

    SHA256

    e30ce553e13d702f6064a81c1bd2958a77a1b0ce99d144b0a027fe369d5a1000

    SHA512

    9fa15fbc09ce426fef8f9f477e91dade4861a45152d508aa9491f27d4b6efa88cec1534969386ed61bf557cf993b6dde8972e5a7bf7ec1d4317ba58b1548ef3e

  • C:\ProgramData\boost_interprocess\twS5oeejDRuo

    Filesize

    256KB

    MD5

    a13fdfe6b3fb10ad51df87464cfe22c7

    SHA1

    bdd1b0d66056f8bc0de9e15b00697be068fd9997

    SHA256

    9442b4d239e3b7f47e270f825d507f0e4480837f123912fb5825a0c52cdb70c0

    SHA512

    ea6f63343ae4f88419bb071ad4f2ce4d0a07bd15ed59f21bb9ecf341a7f083318feaae3429154dd14026ffe927a0aa0c4b36395dceb1ebc94fcf4c6cd52e0303

  • C:\ProgramData\boost_interprocess\zp63JYvQCJSM

    Filesize

    561KB

    MD5

    6b0e33022eaaf52edfdaf9cbf5caa403

    SHA1

    4e8539f25c2c30684ee48ab4f45a8c39e9844a41

    SHA256

    40bf34266d703febee31cfb23c7ba33b3b18652954c9cf0e9264fa5a16c6baec

    SHA512

    be574469776cc70c6ee2744f4ab9ed3dc19bb99288d6ec577bfd14c5378f8a0766bacc22e76cc8632f22cbba095987a42b1b2cf9ed7bed83e5b51520be21abea

  • C:\Users\Admin\AppData\Local\Temp\QMLog\20240711.log

    Filesize

    326B

    MD5

    6e494b3346f24084e0e42462a1c15231

    SHA1

    8d12d8431989ef415f3469e11a2a96f510c12320

    SHA256

    f3fd0d91f7a9105df12e76c31280c2517548826373338f1417e97f2f1df663d5

    SHA512

    dd603984d308af38ce0bb68c7c4731af92b550180b73e0ab6442a7973c6e2046bd93ca39fdb7bcafae0112175688a03d39dca220adcf7afa5435df40da8587d6

  • C:\Users\Admin\AppData\Local\Temp\macAD28.tmp

    Filesize

    1KB

    MD5

    6ec2d447ade6e6033723df51a0efafe5

    SHA1

    4611402ca0f2e58462b6efe8755f8088e8ea1cd8

    SHA256

    67589fd00c257ac03df01596b75695bf4ce7ca5a4404b3e45b7470c3dbea9bf0

    SHA512

    72848e8d31e04f29aff6a86ac6528e9095acf978cdb413155d7f0d62a74e3f9d125f2412453542e9825dbbe9dc6807bc2ed1066b15c9fcfd3a15e0fc537ece65

  • C:\Users\Admin\AppData\Roaming\MyMacro\WeChat.exe

    Filesize

    7.2MB

    MD5

    c77fa3dc4aebbc21dd0f12258d28bc5c

    SHA1

    6cac34000d6eebe9b2947231199793daffb213fc

    SHA256

    9a0c9ba0e4dd1afe54e50f61b6c3d88b96d4b7dddabc275a149010c7e1ee0959

    SHA512

    7ae33680b4f067f31ed750ee7a2c4cb19ebee4135207d8539ba268f2bfbb1dda22086e8091129925fe2f98733bf0b59d710474d07dcdf444cf50c8022107f815

  • C:\Users\Admin\AppData\Roaming\MyMacro\cfgdll.dll

    Filesize

    59KB

    MD5

    b35416c2b3e818894df95608b76934f7

    SHA1

    bbdd1c0f49e9ce54e9312f5edfead76d343c21cf

    SHA256

    8147481d1c93da5ce5de7ff7a72a45756d45ea1f27d27bb8c9944642f42549a3

    SHA512

    92382562761b36b4ed2ec0bba832c66c8f720e190630596ff830a047a498889e7a0f3628d1a3ffac066b06ccd8c2d3840e82b4304b636e1b1ee434910c6f0bdf

  • C:\Users\Admin\AppData\Roaming\MyMacro\qdisp.dll

    Filesize

    303KB

    MD5

    014c01cd6522778e1e15be0e696dfe0c

    SHA1

    c908376fcc4525ec5c4b35d289ef1361ea5cb2d9

    SHA256

    259eaf1ddc9bf610d11a22413853b3d4386fc5a8412c6e602c74eb43f1a32d46

    SHA512

    3b8d040b4a6e879ecf3bafba336b2fc8d793d4f6931902faf87e8f64faf6eca7f1f21485794cffe16c7d0ea907b9f6db93df0b4bae8cb3684733e95608523fd9

  • memory/2368-80-0x0000000000400000-0x0000000000B31000-memory.dmp

    Filesize

    7.2MB

  • memory/2368-86-0x0000000000400000-0x0000000000B31000-memory.dmp

    Filesize

    7.2MB

  • memory/2368-79-0x0000000000400000-0x0000000000B31000-memory.dmp

    Filesize

    7.2MB

  • memory/2368-52-0x0000000000400000-0x0000000000B31000-memory.dmp

    Filesize

    7.2MB

  • memory/2368-81-0x0000000000400000-0x0000000000B31000-memory.dmp

    Filesize

    7.2MB

  • memory/2368-82-0x0000000000401000-0x000000000091D000-memory.dmp

    Filesize

    5.1MB

  • memory/2368-83-0x0000000000400000-0x0000000000B31000-memory.dmp

    Filesize

    7.2MB

  • memory/2368-84-0x0000000000400000-0x0000000000B31000-memory.dmp

    Filesize

    7.2MB

  • memory/2368-85-0x0000000000400000-0x0000000000B31000-memory.dmp

    Filesize

    7.2MB

  • memory/2368-55-0x0000000000401000-0x000000000091D000-memory.dmp

    Filesize

    5.1MB

  • memory/2368-87-0x0000000000400000-0x0000000000B31000-memory.dmp

    Filesize

    7.2MB

  • memory/2368-88-0x0000000000400000-0x0000000000B31000-memory.dmp

    Filesize

    7.2MB

  • memory/2368-89-0x0000000000400000-0x0000000000B31000-memory.dmp

    Filesize

    7.2MB

  • memory/2368-90-0x0000000000400000-0x0000000000B31000-memory.dmp

    Filesize

    7.2MB

  • memory/2368-91-0x0000000000400000-0x0000000000B31000-memory.dmp

    Filesize

    7.2MB

  • memory/2368-92-0x0000000000400000-0x0000000000B31000-memory.dmp

    Filesize

    7.2MB

  • memory/2368-93-0x0000000000400000-0x0000000000B31000-memory.dmp

    Filesize

    7.2MB

  • memory/2368-94-0x0000000000400000-0x0000000000B31000-memory.dmp

    Filesize

    7.2MB