Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    127s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/08/2023, 16:41

General

  • Target

    78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe

  • Size

    280KB

  • MD5

    78d5ba9e6267c0ea1bf437728073246a

  • SHA1

    2839e104f6609e85cab9594d814aeaec39e79f9b

  • SHA256

    74913d370a3ae1a81323607ca957fef0a10ee1251d8df2a56dfd33aa2390106c

  • SHA512

    0d8d337dde272d7778a32ad22b089e489fc30c4e96a246da90d0d7d5fb1c6315755666c010788a365d275761d6d9063cca71568a4de21e5940f11e2b2c54f047

  • SSDEEP

    6144:7Tz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDK:7TBPFV0RyWl3h2E+7pl

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:392
    • C:\Users\Admin\AppData\Roaming\Microsoft\Posix\sidebar2.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\sidebar2.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\sidebar2.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1200
      • C:\Users\Admin\AppData\Roaming\Microsoft\Posix\sidebar2.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\sidebar2.exe"
        3⤵
        • Executes dropped EXE
        PID:4308

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Posix\sidebar2.exe

    Filesize

    280KB

    MD5

    98ecf66fc00da4e14bdbe6a75c5d750b

    SHA1

    e823e586202e360fcda0d49966f495e2a144c302

    SHA256

    8cd6c0dda04ff5842ab5b5c9139f5c053ee713039db71b54e8d111f54198f2ce

    SHA512

    bef97c970bad61456615766e7298b5c3dbf2863d42a4fb5262c5ace47090bc730beb33c047e0fac9dbfc434b3a580a958b273c37d49d701bb470165985ea4cc4

  • C:\Users\Admin\AppData\Roaming\Microsoft\Posix\sidebar2.exe

    Filesize

    280KB

    MD5

    98ecf66fc00da4e14bdbe6a75c5d750b

    SHA1

    e823e586202e360fcda0d49966f495e2a144c302

    SHA256

    8cd6c0dda04ff5842ab5b5c9139f5c053ee713039db71b54e8d111f54198f2ce

    SHA512

    bef97c970bad61456615766e7298b5c3dbf2863d42a4fb5262c5ace47090bc730beb33c047e0fac9dbfc434b3a580a958b273c37d49d701bb470165985ea4cc4

  • C:\Users\Admin\AppData\Roaming\Microsoft\Posix\sidebar2.exe

    Filesize

    280KB

    MD5

    98ecf66fc00da4e14bdbe6a75c5d750b

    SHA1

    e823e586202e360fcda0d49966f495e2a144c302

    SHA256

    8cd6c0dda04ff5842ab5b5c9139f5c053ee713039db71b54e8d111f54198f2ce

    SHA512

    bef97c970bad61456615766e7298b5c3dbf2863d42a4fb5262c5ace47090bc730beb33c047e0fac9dbfc434b3a580a958b273c37d49d701bb470165985ea4cc4

  • C:\Users\Admin\AppData\Roaming\Microsoft\Posix\sidebar2.exe

    Filesize

    280KB

    MD5

    98ecf66fc00da4e14bdbe6a75c5d750b

    SHA1

    e823e586202e360fcda0d49966f495e2a144c302

    SHA256

    8cd6c0dda04ff5842ab5b5c9139f5c053ee713039db71b54e8d111f54198f2ce

    SHA512

    bef97c970bad61456615766e7298b5c3dbf2863d42a4fb5262c5ace47090bc730beb33c047e0fac9dbfc434b3a580a958b273c37d49d701bb470165985ea4cc4