Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10Win32.Mars...nu.exe
windows7-x64
3Win32.Mars...nu.exe
windows10-2004-x64
3Win32.Mars...PC.exe
windows7-x64
7Win32.Mars...PC.exe
windows10-2004-x64
7mars/panel...n.html
windows7-x64
3mars/panel...n.html
windows10-2004-x64
3mars/panel...min.js
windows7-x64
3mars/panel...min.js
windows10-2004-x64
3mars/panel...min.js
windows7-x64
3mars/panel...min.js
windows10-2004-x64
3mars/panel...app.js
windows7-x64
3mars/panel...app.js
windows10-2004-x64
3mars/panel...min.js
windows7-x64
3mars/panel...min.js
windows10-2004-x64
3mars/panel...ker.js
windows7-x64
3mars/panel...ker.js
windows10-2004-x64
3mars/panel...min.js
windows7-x64
3mars/panel...min.js
windows10-2004-x64
3mars/panel...min.js
windows7-x64
3mars/panel...min.js
windows10-2004-x64
3mars/panel...ker.js
windows7-x64
3mars/panel...ker.js
windows10-2004-x64
3mars/panel...min.js
windows7-x64
3mars/panel...min.js
windows10-2004-x64
3mars/panel...nit.js
windows7-x64
3mars/panel...nit.js
windows10-2004-x64
3mars/panel...min.js
windows7-x64
3mars/panel...min.js
windows10-2004-x64
3mars/panel...ore.js
windows7-x64
3mars/panel...ore.js
windows10-2004-x64
3mars/panel...ced.js
windows7-x64
3mars/panel...ced.js
windows10-2004-x64
3Analysis
-
max time kernel
120s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18/02/2025, 17:57 UTC
Behavioral task
behavioral1
Sample
Win32.MarsStealer/Mars-Stealer-main/MarsStealer_Menu.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Win32.MarsStealer/Mars-Stealer-main/MarsStealer_Menu.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
Win32.MarsStealer/Mars-Stealer-main/Mars_Stealer_cracked_by_LLCPPC.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Win32.MarsStealer/Mars-Stealer-main/Mars_Stealer_cracked_by_LLCPPC.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
mars/panel/assets/css/jquery-ui.min.html
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
mars/panel/assets/css/jquery-ui.min.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
mars/panel/assets/js/FileSaver.min.js
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
mars/panel/assets/js/FileSaver.min.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
mars/panel/assets/js/apexcharts.min.js
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
mars/panel/assets/js/apexcharts.min.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
mars/panel/assets/js/app.js
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
mars/panel/assets/js/app.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
mars/panel/assets/js/bootstrap-colorpicker.min.js
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
mars/panel/assets/js/bootstrap-colorpicker.min.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
mars/panel/assets/js/bootstrap-material-datetimepicker.js
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
mars/panel/assets/js/bootstrap-material-datetimepicker.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
mars/panel/assets/js/bootstrap-maxlength.min.js
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
mars/panel/assets/js/bootstrap-maxlength.min.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
mars/panel/assets/js/bootstrap.bundle.min.js
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
mars/panel/assets/js/bootstrap.bundle.min.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
mars/panel/assets/js/daterangepicker.js
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
mars/panel/assets/js/daterangepicker.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
mars/panel/assets/js/feather.min.js
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
mars/panel/assets/js/feather.min.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
mars/panel/assets/js/jquery.analytics_dashboard.init.js
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
mars/panel/assets/js/jquery.analytics_dashboard.init.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
mars/panel/assets/js/jquery.bootstrap-touchspin.min.js
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
mars/panel/assets/js/jquery.bootstrap-touchspin.min.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
mars/panel/assets/js/jquery.core.js
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
mars/panel/assets/js/jquery.core.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
mars/panel/assets/js/jquery.forms-advanced.js
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
mars/panel/assets/js/jquery.forms-advanced.js
Resource
win10v2004-20250217-en
General
-
Target
mars/panel/assets/css/jquery-ui.min.html
-
Size
279B
-
MD5
3d94c5db6219640112a01c9f126e894f
-
SHA1
042b019ca257c1c8f979ee8c2e13105ee2d92327
-
SHA256
d36921d85f158a051daed4dd44ca81fc98a4b707c71f0b587a3e8df8d683f5a2
-
SHA512
74da9160f3a50e944a922a209dda4d0a2c4b088b646e57fdf7d2e707d70594d280c89855acadd09ed4e0a1b37fe9b7d758ef7e00b3fc5290386ec1163a853f83
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003debd53dad40254cb1d4592b1420f07600000000020000000000106600000001000020000000d26fe8eb37630f4257411030c28a48aa6917976058f569fea8fccd005c8af15a000000000e80000000020000200000000bb8d1263846856ab8e522234b434e07adb7518ceaa891d9b25e68d5faf70c3f20000000f263958d00451239d07ada009f94ac69489a4c218cb06909ef599ab05468a8d7400000000d30f99612c7dce62211ba22d5eee0a04c6b4cb164c26bbfca825c752444f8d1ad6f9985ac150f68ca1b3f2d593062e71f026bd0d06414d578bd48087ab2cfbf iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 803067cd2e82db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F7DFC701-EE21-11EF-B666-DEF96DC0BBD1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "446063385" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2308 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2308 iexplore.exe 2308 iexplore.exe 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2388 2308 iexplore.exe 30 PID 2308 wrote to memory of 2388 2308 iexplore.exe 30 PID 2308 wrote to memory of 2388 2308 iexplore.exe 30 PID 2308 wrote to memory of 2388 2308 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\mars\panel\assets\css\jquery-ui.min.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2308 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c7b61bac90929cfc75db0e2198ecaf6
SHA1c1c89fd5f89cd3c022a5a3a04f3076a421b41e15
SHA256e5e5e39a8d864d0eb371e18e682e3e15f60fd06b7ed25d604abebe60996004c4
SHA512f23d9ebc6dce3ec5513497e9ded3955cca59d6823d153ecee49c63174eda741985e0c3b3e1f59f61b7b8c27dfce6791e2007c77777ab0b61a7f67d72d1586137
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a852e7b3b61697552283649c19ff0c9b
SHA1dbbb193a2da87b73aea9a14e187963d7c053b611
SHA25691fa1313006afc1314341d484486ff09ed06fcdbfe4c22c5f3afedec9c47b643
SHA51265d6ab9679dc9e8144af3f0ec3346be03d86aa3f723cb21a469898e6ff380a636ae24a8ef47a04e26f44ea74488a0f63550b053a8e193494ac40be7d35300904
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5694c3244c76514a69f0f3e3a59fef0a6
SHA137c8943d7d217bbdecd14da2855215dc2a1db70f
SHA256e3701c507c048efed687ee2f81e750b2ff0800cd7f2a884b3af576d87198dac1
SHA5123896e1cda7d188995d717db198c3a206c987dd6698dcaa90b5443255402e46d5ce244a8b93327e4ecd75fefc10b37a66e8344288ed4e124a5d7df9c9f64db49b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538e2b065c90b8a72670fb0f1053e93a1
SHA15ccd7d7c0261085771ab3c6e9005fcc62d658664
SHA256a8611319feec9dd7a62c0654c72bf4a65fdf37019080f251d7a1f6135f071ef9
SHA5126c5ce9035927e76d8ab66db59445681e14ddee60176225af7154a24f4d46a540beb434e02b58785a7089cec924d37d8b67bb62612c0f2bc30beabd38cb5fcfdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fbdcd8a3755f1c03e42d1484959e90d
SHA1b516cae020375f41376a6b90dc0a667bc860c25b
SHA2563f0f60e56bf1cdeb42755c0d16bdc3ba1adaaeceb30e5fdba20030f65656808c
SHA512a48c65fcd5a50905ae4c4e87c78772c7680821c1ea992417c810458ed71c3947585d9d278f1cc2e9db3861a443ad2943d6f7d6d560720f9c8283516fed1d3196
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5076a48159df2c685756cb8e69298c2c6
SHA1b12d9a1f286dfa09c320511ecc9327b38cf72c40
SHA256d6dc768048f613cceea8d6001487077232dfaf074ce6e0df6dea400c8b720752
SHA512c61bf4b3b63b7cff7bdbbbbfc2ae1f99e2694bc5cdc4272908f53bc7b7640ac5ea46101e3882ea60bc0ce408c7e38605422574324ea067a45f5446a2d3527559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b1b1f38913701f4ba49d6a53cc21c11
SHA15121c93a29ccf284d9e060a2f6720f5ef9117e55
SHA256590a80c7703564d59e45be8f6639270af3edc2c72d27e3b04c17d675e88c529c
SHA5126381359521216219fee8034940ec63c7c33b8b609324446a19902e0a2d43493ab8402277586c8d1d356a5119fc61a23eec853f03ca33deac1d6f298240748f2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55695a6e4a9653f3f6ff407d076e94744
SHA1bebab7c33dd9ed46ecdd03f2cd207cc6a3a435a3
SHA256ee8bbfb4e0f294169f0f988a5accf4779e911d7040d9d904c8a23575d2492b26
SHA512080bab6038c0f2cb2a36ca7e3883e05f905b04758ad8afe59ba3030bff151b149d4c75b3e0bf9987cca363ba6a3191599f961c559a65cf8bf6edeb46ee956fc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5242a2f7e44d9f029fb6ab7d75707c4e1
SHA1f29e87a6cadc1b76ab09a127ced79ca0ef2937c2
SHA25646bf8ed702a764aecaac0523434a7d5a4ae9cf2a54b1e2acf28e56ec89bd9146
SHA512099fe54623d049b53e4ce898e8b6f33822bbde5fcf5302616776c192421d64be649c3761a1d37fe57ee8b1fa89dc38b69a93a478f5590edb19f3c6a95037b689
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f37ec0d9bab03782a74f6af431e84478
SHA1aadf8fe9d16defc54d76b7a396e35678b8576864
SHA2567336066e215daa53941d7db87e280f78f04708f70ae4a328fa33d58594ff51f0
SHA51238331116e6084d7945db9c95974500807a97c199fb7a6217cbf38095c28c17187b26ba219ba1f40da8ab4f45232dc16f121d0d2c8c3f7a21fe78ecf96247e2c9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b