Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2024, 13:47
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-27_bb5ff3182739cf9b196117e76c809e25_mafia_nionspy.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-27_bb5ff3182739cf9b196117e76c809e25_mafia_nionspy.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-27_bb5ff3182739cf9b196117e76c809e25_mafia_nionspy.exe
-
Size
327KB
-
MD5
bb5ff3182739cf9b196117e76c809e25
-
SHA1
c2a7f97da376c1aa99f4296c3dc752352af4d1ad
-
SHA256
54bc04a065390bb26b50545b30d90bdf43a4ad8188346257094e194f505deac3
-
SHA512
e58131c8272b1151b9ff8afb9592acf1efa6e6e446fef9fc9806528ac951cb7738e41a0ca524ac948223a5337668520575849f58238f26f1757639d8b6a79b35
-
SSDEEP
6144:S2+JS2sFafI8U0obHCW/2a7XQcsPMjVWrG8KgbPzDh:S2TFafJiHCWBWPMjVWrXK0
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation 2024-01-27_bb5ff3182739cf9b196117e76c809e25_mafia_nionspy.exe -
Executes dropped EXE 2 IoCs
pid Process 2636 winit32.exe 2100 winit32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe\DefaultIcon 2024-01-27_bb5ff3182739cf9b196117e76c809e25_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe\shell 2024-01-27_bb5ff3182739cf9b196117e76c809e25_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\ntdriver\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-01-27_bb5ff3182739cf9b196117e76c809e25_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\ntdriver\shell\runas\command\ = "\"%1\" %*" 2024-01-27_bb5ff3182739cf9b196117e76c809e25_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe\ = "ntdriver" 2024-01-27_bb5ff3182739cf9b196117e76c809e25_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-01-27_bb5ff3182739cf9b196117e76c809e25_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 2024-01-27_bb5ff3182739cf9b196117e76c809e25_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\ntdriver\ = "Application" 2024-01-27_bb5ff3182739cf9b196117e76c809e25_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\ntdriver\DefaultIcon 2024-01-27_bb5ff3182739cf9b196117e76c809e25_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe\DefaultIcon\ = "%1" 2024-01-27_bb5ff3182739cf9b196117e76c809e25_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\ntdriver\shell 2024-01-27_bb5ff3182739cf9b196117e76c809e25_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\ntdriver\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-01-27_bb5ff3182739cf9b196117e76c809e25_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe\shell\open\command 2024-01-27_bb5ff3182739cf9b196117e76c809e25_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\Local Settings 2024-01-27_bb5ff3182739cf9b196117e76c809e25_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\ntdriver 2024-01-27_bb5ff3182739cf9b196117e76c809e25_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\ntdriver\shell\open 2024-01-27_bb5ff3182739cf9b196117e76c809e25_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\ntdriver\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SView\\winit32.exe\" /START \"%1\" %*" 2024-01-27_bb5ff3182739cf9b196117e76c809e25_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe\shell\runas\command 2024-01-27_bb5ff3182739cf9b196117e76c809e25_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\ntdriver\Content-Type = "application/x-msdownload" 2024-01-27_bb5ff3182739cf9b196117e76c809e25_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\ntdriver\shell\open\command 2024-01-27_bb5ff3182739cf9b196117e76c809e25_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\ntdriver\shell\runas\command 2024-01-27_bb5ff3182739cf9b196117e76c809e25_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SView\\winit32.exe\" /START \"%1\" %*" 2024-01-27_bb5ff3182739cf9b196117e76c809e25_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\ntdriver\DefaultIcon\ = "%1" 2024-01-27_bb5ff3182739cf9b196117e76c809e25_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\ntdriver\shell\runas 2024-01-27_bb5ff3182739cf9b196117e76c809e25_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe 2024-01-27_bb5ff3182739cf9b196117e76c809e25_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe\Content-Type = "application/x-msdownload" 2024-01-27_bb5ff3182739cf9b196117e76c809e25_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe\shell\runas 2024-01-27_bb5ff3182739cf9b196117e76c809e25_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-01-27_bb5ff3182739cf9b196117e76c809e25_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe\shell\open 2024-01-27_bb5ff3182739cf9b196117e76c809e25_mafia_nionspy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2024-01-27_bb5ff3182739cf9b196117e76c809e25_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2636 winit32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3672 wrote to memory of 2636 3672 2024-01-27_bb5ff3182739cf9b196117e76c809e25_mafia_nionspy.exe 91 PID 3672 wrote to memory of 2636 3672 2024-01-27_bb5ff3182739cf9b196117e76c809e25_mafia_nionspy.exe 91 PID 3672 wrote to memory of 2636 3672 2024-01-27_bb5ff3182739cf9b196117e76c809e25_mafia_nionspy.exe 91 PID 2636 wrote to memory of 2100 2636 winit32.exe 92 PID 2636 wrote to memory of 2100 2636 winit32.exe 92 PID 2636 wrote to memory of 2100 2636 winit32.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-27_bb5ff3182739cf9b196117e76c809e25_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-27_bb5ff3182739cf9b196117e76c809e25_mafia_nionspy.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\AppData\Roaming\Microsoft\SView\winit32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SView\winit32.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SView\winit32.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Roaming\Microsoft\SView\winit32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SView\winit32.exe"3⤵
- Executes dropped EXE
PID:2100
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
327KB
MD52e72a9cdf0918fc4603294a4a3c1079e
SHA1214817ab46c9a618ac6353691c44a6522e32f179
SHA256a9ff8328371a5ddd5ff77a3d08d1a66aa146e7eedebf79138189c20feb11a74b
SHA51221d98e473fcb4e7c58339058e8ab0757043b0642cc4a9f2caeb1a49d92febc40ffa0b13731672bea764cfaf0e49d32db648025c0cebe13f95d0de094a82dd835