Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2023, 15:19
Static task
static1
Behavioral task
behavioral1
Sample
14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe
-
Size
327KB
-
MD5
14239e1f728fd1cf0461298d0bc74500
-
SHA1
4febcd8c5ed64e7040c8def3af873d4d2d26ca1b
-
SHA256
e2b4e48f1f784653214a715670e3107f945894e8a1eb7cea4ec9cc1679f0ca4e
-
SHA512
7887540710ded5c0dbabf3024bc8476a559f0e0faad21a69dde118fd57be3c68e6f37ecf15183e301974a5ed343c1908f649c2f56b44b002327e5b8fb2b2b1b0
-
SSDEEP
6144:U2+JS2sFafI8U0obHCW/2a7XQcsPMjVWrG8KgbPzDh:U2TFafJiHCWBWPMjVWrXK0
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 5068 taskhostsys.exe 1068 taskhostsys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\jitc\shell\runas 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\jitc\shell\open\command 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\jitc\shell\open 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\DefaultIcon 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\jitc\Content-Type = "application/x-msdownload" 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\jitc\shell 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\jitc\shell\runas\command\ = "\"%1\" %*" 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\Content-Type = "application/x-msdownload" 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\shell\open\command 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\Local Settings 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\jitc\ = "Application" 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\jitc\shell\open\command\IsolatedCommand = "\"%1\" %*" 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\jitc\shell\runas\command\IsolatedCommand = "\"%1\" %*" 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\shell\runas\command 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\jitc\DefaultIcon\ = "%1" 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\shell 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_32\\taskhostsys.exe\" /START \"%1\" %*" 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\jitc 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\jitc\DefaultIcon 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\jitc\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_32\\taskhostsys.exe\" /START \"%1\" %*" 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\jitc\shell\runas\command 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\shell\open 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\shell\runas 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\ = "jitc" 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\DefaultIcon\ = "%1" 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 5068 taskhostsys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3648 wrote to memory of 5068 3648 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe 82 PID 3648 wrote to memory of 5068 3648 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe 82 PID 3648 wrote to memory of 5068 3648 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe 82 PID 5068 wrote to memory of 1068 5068 taskhostsys.exe 83 PID 5068 wrote to memory of 1068 5068 taskhostsys.exe 83 PID 5068 wrote to memory of 1068 5068 taskhostsys.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe"C:\Users\Admin\AppData\Local\Temp\14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\taskhostsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\taskhostsys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\taskhostsys.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\taskhostsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\taskhostsys.exe"3⤵
- Executes dropped EXE
PID:1068
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
327KB
MD5ea967797c5296b8aaefca99e01b21d9a
SHA1663656dbe890c9cebf38835289e3df8f54313eab
SHA256610abb95126ff0c5223dacfe721d8429107dc2ab1559484b8e13889d7377d7d8
SHA512d42666588a6e8d7b00c9c5c0ea7a716fec2d5599fb51d8eae13e9751ddbacf24cc91876782cd6808e9a9f2f14298ea699e02655b0df574306e6de7e5848d4215
-
Filesize
327KB
MD5ea967797c5296b8aaefca99e01b21d9a
SHA1663656dbe890c9cebf38835289e3df8f54313eab
SHA256610abb95126ff0c5223dacfe721d8429107dc2ab1559484b8e13889d7377d7d8
SHA512d42666588a6e8d7b00c9c5c0ea7a716fec2d5599fb51d8eae13e9751ddbacf24cc91876782cd6808e9a9f2f14298ea699e02655b0df574306e6de7e5848d4215
-
Filesize
327KB
MD5ea967797c5296b8aaefca99e01b21d9a
SHA1663656dbe890c9cebf38835289e3df8f54313eab
SHA256610abb95126ff0c5223dacfe721d8429107dc2ab1559484b8e13889d7377d7d8
SHA512d42666588a6e8d7b00c9c5c0ea7a716fec2d5599fb51d8eae13e9751ddbacf24cc91876782cd6808e9a9f2f14298ea699e02655b0df574306e6de7e5848d4215
-
Filesize
327KB
MD5ea967797c5296b8aaefca99e01b21d9a
SHA1663656dbe890c9cebf38835289e3df8f54313eab
SHA256610abb95126ff0c5223dacfe721d8429107dc2ab1559484b8e13889d7377d7d8
SHA512d42666588a6e8d7b00c9c5c0ea7a716fec2d5599fb51d8eae13e9751ddbacf24cc91876782cd6808e9a9f2f14298ea699e02655b0df574306e6de7e5848d4215