Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    138s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/08/2023, 15:19

General

  • Target

    14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe

  • Size

    327KB

  • MD5

    14239e1f728fd1cf0461298d0bc74500

  • SHA1

    4febcd8c5ed64e7040c8def3af873d4d2d26ca1b

  • SHA256

    e2b4e48f1f784653214a715670e3107f945894e8a1eb7cea4ec9cc1679f0ca4e

  • SHA512

    7887540710ded5c0dbabf3024bc8476a559f0e0faad21a69dde118fd57be3c68e6f37ecf15183e301974a5ed343c1908f649c2f56b44b002327e5b8fb2b2b1b0

  • SSDEEP

    6144:U2+JS2sFafI8U0obHCW/2a7XQcsPMjVWrG8KgbPzDh:U2TFafJiHCWBWPMjVWrXK0

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3648
    • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\taskhostsys.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\taskhostsys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\taskhostsys.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5068
      • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\taskhostsys.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\taskhostsys.exe"
        3⤵
        • Executes dropped EXE
        PID:1068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\taskhostsys.exe

    Filesize

    327KB

    MD5

    ea967797c5296b8aaefca99e01b21d9a

    SHA1

    663656dbe890c9cebf38835289e3df8f54313eab

    SHA256

    610abb95126ff0c5223dacfe721d8429107dc2ab1559484b8e13889d7377d7d8

    SHA512

    d42666588a6e8d7b00c9c5c0ea7a716fec2d5599fb51d8eae13e9751ddbacf24cc91876782cd6808e9a9f2f14298ea699e02655b0df574306e6de7e5848d4215

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\taskhostsys.exe

    Filesize

    327KB

    MD5

    ea967797c5296b8aaefca99e01b21d9a

    SHA1

    663656dbe890c9cebf38835289e3df8f54313eab

    SHA256

    610abb95126ff0c5223dacfe721d8429107dc2ab1559484b8e13889d7377d7d8

    SHA512

    d42666588a6e8d7b00c9c5c0ea7a716fec2d5599fb51d8eae13e9751ddbacf24cc91876782cd6808e9a9f2f14298ea699e02655b0df574306e6de7e5848d4215

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\taskhostsys.exe

    Filesize

    327KB

    MD5

    ea967797c5296b8aaefca99e01b21d9a

    SHA1

    663656dbe890c9cebf38835289e3df8f54313eab

    SHA256

    610abb95126ff0c5223dacfe721d8429107dc2ab1559484b8e13889d7377d7d8

    SHA512

    d42666588a6e8d7b00c9c5c0ea7a716fec2d5599fb51d8eae13e9751ddbacf24cc91876782cd6808e9a9f2f14298ea699e02655b0df574306e6de7e5848d4215

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\taskhostsys.exe

    Filesize

    327KB

    MD5

    ea967797c5296b8aaefca99e01b21d9a

    SHA1

    663656dbe890c9cebf38835289e3df8f54313eab

    SHA256

    610abb95126ff0c5223dacfe721d8429107dc2ab1559484b8e13889d7377d7d8

    SHA512

    d42666588a6e8d7b00c9c5c0ea7a716fec2d5599fb51d8eae13e9751ddbacf24cc91876782cd6808e9a9f2f14298ea699e02655b0df574306e6de7e5848d4215