Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04/02/2024, 05:01

General

  • Target

    2024-02-04_0731bbf90e266a07373107ee7723a7e6_mafia_nionspy.exe

  • Size

    280KB

  • MD5

    0731bbf90e266a07373107ee7723a7e6

  • SHA1

    133e1aae41fb6f0c3a49c482c1aa4edf33624c82

  • SHA256

    5c9a0ec78c8bce95b9493e65def6f8d08a7e75e1c4efde25dd044731ffcfc12d

  • SHA512

    8755e90abae997de506118afe55ff26bd431e8320fa66adf09bb7e528fab6b5cd91a92cd5219a2643da0a06ad706b9d534f7e6d9dc9cada4d1e7bb8c4591419c

  • SSDEEP

    6144:vQ+Tyfx4NF67Sbq2nW82X45gc3BaLZVS0mOoC8zbzDie:vQMyfmNFHfnWfhLZVHmOog

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-04_0731bbf90e266a07373107ee7723a7e6_mafia_nionspy.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-04_0731bbf90e266a07373107ee7723a7e6_mafia_nionspy.exe"
    1⤵
    • Loads dropped DLL
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1228
    • C:\Users\Admin\AppData\Roaming\Microsoft\Posix\wlogon32.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\wlogon32.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\wlogon32.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2940
      • C:\Users\Admin\AppData\Roaming\Microsoft\Posix\wlogon32.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\wlogon32.exe"
        3⤵
        • Executes dropped EXE
        PID:2936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Posix\wlogon32.exe

    Filesize

    280KB

    MD5

    bddf7aba7da05f0dd0ca7cec599af3aa

    SHA1

    b93dc7753fa9e9d537b3d94424f4fa65d8e2f828

    SHA256

    3bbbbd15697349e2f3dd27c1624152f9c85779c1dd13d981596c81eec3883631

    SHA512

    8c47561417eef41d1763e12a7453bbd1895e0bb37f38eeaabcb168234a18132807856ce1a75d4cbe224bdbff96e6a5ee7f450c14856a7359a67541b8d7b8573a