Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2023, 15:14
Static task
static1
Behavioral task
behavioral1
Sample
997f39e96ad37cba3e4261b750ae1dd8_mafia_nionspy_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
997f39e96ad37cba3e4261b750ae1dd8_mafia_nionspy_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
997f39e96ad37cba3e4261b750ae1dd8_mafia_nionspy_JC.exe
-
Size
327KB
-
MD5
997f39e96ad37cba3e4261b750ae1dd8
-
SHA1
b7364983c6cff0f64e408d3f41cd0338ac9c5035
-
SHA256
b889599d491f54d24c69df41e08475343b63b862c244ef3e251ff75803516068
-
SHA512
67f4d824d971efe8bbcd6c8a4ab1ff6d549422b5dc5125a05680f907591b313f6891846268489417319a5b033cccba54509c11952347c1a288ecbf1f18b02218
-
SSDEEP
6144:c2+JS2sFafI8U0obHCW/2a7XQcsPMjVWrG8KgbPzDh:c2TFafJiHCWBWPMjVWrXK0
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4856 wlogon32.exe 1740 wlogon32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\.exe\shell\open\command 997f39e96ad37cba3e4261b750ae1dd8_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\haldriver\shell 997f39e96ad37cba3e4261b750ae1dd8_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\haldriver\shell\runas\command 997f39e96ad37cba3e4261b750ae1dd8_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\.exe 997f39e96ad37cba3e4261b750ae1dd8_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\haldriver\shell\open\command 997f39e96ad37cba3e4261b750ae1dd8_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\haldriver\shell\open 997f39e96ad37cba3e4261b750ae1dd8_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\.exe\ = "haldriver" 997f39e96ad37cba3e4261b750ae1dd8_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\.exe\shell\open 997f39e96ad37cba3e4261b750ae1dd8_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 997f39e96ad37cba3e4261b750ae1dd8_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\haldriver\ = "Application" 997f39e96ad37cba3e4261b750ae1dd8_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\haldriver\shell\runas\command\ = "\"%1\" %*" 997f39e96ad37cba3e4261b750ae1dd8_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\.exe\DefaultIcon\ = "%1" 997f39e96ad37cba3e4261b750ae1dd8_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\haldriver 997f39e96ad37cba3e4261b750ae1dd8_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\haldriver\DefaultIcon 997f39e96ad37cba3e4261b750ae1dd8_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\.exe\Content-Type = "application/x-msdownload" 997f39e96ad37cba3e4261b750ae1dd8_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 997f39e96ad37cba3e4261b750ae1dd8_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\haldriver\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Sys32\\wlogon32.exe\" /START \"%1\" %*" 997f39e96ad37cba3e4261b750ae1dd8_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\haldriver\shell\runas\command\IsolatedCommand = "\"%1\" %*" 997f39e96ad37cba3e4261b750ae1dd8_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\.exe\shell\runas 997f39e96ad37cba3e4261b750ae1dd8_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\Local Settings 997f39e96ad37cba3e4261b750ae1dd8_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\haldriver\Content-Type = "application/x-msdownload" 997f39e96ad37cba3e4261b750ae1dd8_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\.exe\DefaultIcon 997f39e96ad37cba3e4261b750ae1dd8_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\.exe\shell\runas\command 997f39e96ad37cba3e4261b750ae1dd8_mafia_nionspy_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 997f39e96ad37cba3e4261b750ae1dd8_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\haldriver\DefaultIcon\ = "%1" 997f39e96ad37cba3e4261b750ae1dd8_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\haldriver\shell\open\command\IsolatedCommand = "\"%1\" %*" 997f39e96ad37cba3e4261b750ae1dd8_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\.exe\shell 997f39e96ad37cba3e4261b750ae1dd8_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\haldriver\shell\runas 997f39e96ad37cba3e4261b750ae1dd8_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Sys32\\wlogon32.exe\" /START \"%1\" %*" 997f39e96ad37cba3e4261b750ae1dd8_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 997f39e96ad37cba3e4261b750ae1dd8_mafia_nionspy_JC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4856 wlogon32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1328 wrote to memory of 4856 1328 997f39e96ad37cba3e4261b750ae1dd8_mafia_nionspy_JC.exe 84 PID 1328 wrote to memory of 4856 1328 997f39e96ad37cba3e4261b750ae1dd8_mafia_nionspy_JC.exe 84 PID 1328 wrote to memory of 4856 1328 997f39e96ad37cba3e4261b750ae1dd8_mafia_nionspy_JC.exe 84 PID 4856 wrote to memory of 1740 4856 wlogon32.exe 85 PID 4856 wrote to memory of 1740 4856 wlogon32.exe 85 PID 4856 wrote to memory of 1740 4856 wlogon32.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\997f39e96ad37cba3e4261b750ae1dd8_mafia_nionspy_JC.exe"C:\Users\Admin\AppData\Local\Temp\997f39e96ad37cba3e4261b750ae1dd8_mafia_nionspy_JC.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\wlogon32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\wlogon32.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\wlogon32.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\wlogon32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\wlogon32.exe"3⤵
- Executes dropped EXE
PID:1740
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
327KB
MD57be5bd2d935cb8b6cd402ab46e01f4bd
SHA10576b25e2ecc96a493479ff09d1ae2e1dcd22c92
SHA256f6b203309a70d507549bd9abb25c936688f463ff0bc46559c25573a689754f6b
SHA512c7c0cd45117c6ad8d8971a74adb84ece49bb8d06e02b12b628b0f33758d9178c6289b7a82ee0306e691e1c72c3b717e5ab4affa2c0fc6f517cc5280ceea02b11
-
Filesize
327KB
MD57be5bd2d935cb8b6cd402ab46e01f4bd
SHA10576b25e2ecc96a493479ff09d1ae2e1dcd22c92
SHA256f6b203309a70d507549bd9abb25c936688f463ff0bc46559c25573a689754f6b
SHA512c7c0cd45117c6ad8d8971a74adb84ece49bb8d06e02b12b628b0f33758d9178c6289b7a82ee0306e691e1c72c3b717e5ab4affa2c0fc6f517cc5280ceea02b11
-
Filesize
327KB
MD57be5bd2d935cb8b6cd402ab46e01f4bd
SHA10576b25e2ecc96a493479ff09d1ae2e1dcd22c92
SHA256f6b203309a70d507549bd9abb25c936688f463ff0bc46559c25573a689754f6b
SHA512c7c0cd45117c6ad8d8971a74adb84ece49bb8d06e02b12b628b0f33758d9178c6289b7a82ee0306e691e1c72c3b717e5ab4affa2c0fc6f517cc5280ceea02b11
-
Filesize
327KB
MD57be5bd2d935cb8b6cd402ab46e01f4bd
SHA10576b25e2ecc96a493479ff09d1ae2e1dcd22c92
SHA256f6b203309a70d507549bd9abb25c936688f463ff0bc46559c25573a689754f6b
SHA512c7c0cd45117c6ad8d8971a74adb84ece49bb8d06e02b12b628b0f33758d9178c6289b7a82ee0306e691e1c72c3b717e5ab4affa2c0fc6f517cc5280ceea02b11