Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
127s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2023, 16:41
Static task
static1
Behavioral task
behavioral1
Sample
78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe
-
Size
280KB
-
MD5
78d5ba9e6267c0ea1bf437728073246a
-
SHA1
2839e104f6609e85cab9594d814aeaec39e79f9b
-
SHA256
74913d370a3ae1a81323607ca957fef0a10ee1251d8df2a56dfd33aa2390106c
-
SHA512
0d8d337dde272d7778a32ad22b089e489fc30c4e96a246da90d0d7d5fb1c6315755666c010788a365d275761d6d9063cca71568a4de21e5940f11e2b2c54f047
-
SSDEEP
6144:7Tz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDK:7TBPFV0RyWl3h2E+7pl
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1200 sidebar2.exe 4308 sidebar2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\prochost\shell\open\command\IsolatedCommand = "\"%1\" %*" 78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\shell 78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\prochost\Content-Type = "application/x-msdownload" 78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\ = "prochost" 78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\DefaultIcon 78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\shell\open\command 78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\shell\runas\command 78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\prochost\shell\runas\command 78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\DefaultIcon\ = "%1" 78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\shell\runas 78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings 78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\prochost\DefaultIcon\ = "%1" 78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe 78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\Content-Type = "application/x-msdownload" 78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\shell\open 78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\prochost\shell 78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\prochost\shell\runas\command\ = "\"%1\" %*" 78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\prochost\shell\runas\command\IsolatedCommand = "\"%1\" %*" 78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\prochost\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Posix\\sidebar2.exe\" /START \"%1\" %*" 78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\prochost\shell\open\command 78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\prochost\shell\open 78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\prochost\shell\runas 78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\prochost\DefaultIcon 78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Posix\\sidebar2.exe\" /START \"%1\" %*" 78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\prochost\ = "Application" 78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\prochost 78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1200 sidebar2.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 392 wrote to memory of 1200 392 78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe 81 PID 392 wrote to memory of 1200 392 78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe 81 PID 392 wrote to memory of 1200 392 78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe 81 PID 1200 wrote to memory of 4308 1200 sidebar2.exe 82 PID 1200 wrote to memory of 4308 1200 sidebar2.exe 82 PID 1200 wrote to memory of 4308 1200 sidebar2.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe"C:\Users\Admin\AppData\Local\Temp\78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Roaming\Microsoft\Posix\sidebar2.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Posix\sidebar2.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\sidebar2.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Roaming\Microsoft\Posix\sidebar2.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Posix\sidebar2.exe"3⤵
- Executes dropped EXE
PID:4308
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD598ecf66fc00da4e14bdbe6a75c5d750b
SHA1e823e586202e360fcda0d49966f495e2a144c302
SHA2568cd6c0dda04ff5842ab5b5c9139f5c053ee713039db71b54e8d111f54198f2ce
SHA512bef97c970bad61456615766e7298b5c3dbf2863d42a4fb5262c5ace47090bc730beb33c047e0fac9dbfc434b3a580a958b273c37d49d701bb470165985ea4cc4
-
Filesize
280KB
MD598ecf66fc00da4e14bdbe6a75c5d750b
SHA1e823e586202e360fcda0d49966f495e2a144c302
SHA2568cd6c0dda04ff5842ab5b5c9139f5c053ee713039db71b54e8d111f54198f2ce
SHA512bef97c970bad61456615766e7298b5c3dbf2863d42a4fb5262c5ace47090bc730beb33c047e0fac9dbfc434b3a580a958b273c37d49d701bb470165985ea4cc4
-
Filesize
280KB
MD598ecf66fc00da4e14bdbe6a75c5d750b
SHA1e823e586202e360fcda0d49966f495e2a144c302
SHA2568cd6c0dda04ff5842ab5b5c9139f5c053ee713039db71b54e8d111f54198f2ce
SHA512bef97c970bad61456615766e7298b5c3dbf2863d42a4fb5262c5ace47090bc730beb33c047e0fac9dbfc434b3a580a958b273c37d49d701bb470165985ea4cc4
-
Filesize
280KB
MD598ecf66fc00da4e14bdbe6a75c5d750b
SHA1e823e586202e360fcda0d49966f495e2a144c302
SHA2568cd6c0dda04ff5842ab5b5c9139f5c053ee713039db71b54e8d111f54198f2ce
SHA512bef97c970bad61456615766e7298b5c3dbf2863d42a4fb5262c5ace47090bc730beb33c047e0fac9dbfc434b3a580a958b273c37d49d701bb470165985ea4cc4