Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18/02/2024, 03:57
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-18_d96014cb614ade63ba5fb0a2f68644f5_mafia_nionspy.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-18_d96014cb614ade63ba5fb0a2f68644f5_mafia_nionspy.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-18_d96014cb614ade63ba5fb0a2f68644f5_mafia_nionspy.exe
-
Size
288KB
-
MD5
d96014cb614ade63ba5fb0a2f68644f5
-
SHA1
c7a7b16ae259ee61331d0e30e8ca1baa704fc3c3
-
SHA256
f8a5997d2828f5b951c2b6eefdd83ca6687d0e58e46962b1a244e7c8ad417c34
-
SHA512
eb95181d37053de0d7ce6395ce8f56da081f84ebf53da1edfcf5b7b9f0158177ff3cf811d6364f97ddcc3e26072105646c4a4bae56102e952689fc240cfa6dbf
-
SSDEEP
6144:TQ+Tyfx4NF67Sbq2nW82X45gc3BaLZVS0mOoC8zbzDie:TQMyfmNFHfnWfhLZVHmOog
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2760 dwmsys.exe 2672 dwmsys.exe -
Loads dropped DLL 4 IoCs
pid Process 2232 2024-02-18_d96014cb614ade63ba5fb0a2f68644f5_mafia_nionspy.exe 2232 2024-02-18_d96014cb614ade63ba5fb0a2f68644f5_mafia_nionspy.exe 2232 2024-02-18_d96014cb614ade63ba5fb0a2f68644f5_mafia_nionspy.exe 2760 dwmsys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 28 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\.exe\DefaultIcon 2024-02-18_d96014cb614ade63ba5fb0a2f68644f5_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_amd64\\dwmsys.exe\" /START \"%1\" %*" 2024-02-18_d96014cb614ade63ba5fb0a2f68644f5_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\systemui\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-02-18_d96014cb614ade63ba5fb0a2f68644f5_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\systemui\Content-Type = "application/x-msdownload" 2024-02-18_d96014cb614ade63ba5fb0a2f68644f5_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\systemui\DefaultIcon\ = "%1" 2024-02-18_d96014cb614ade63ba5fb0a2f68644f5_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\systemui\shell\open 2024-02-18_d96014cb614ade63ba5fb0a2f68644f5_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\.exe\shell\open 2024-02-18_d96014cb614ade63ba5fb0a2f68644f5_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" 2024-02-18_d96014cb614ade63ba5fb0a2f68644f5_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\.exe 2024-02-18_d96014cb614ade63ba5fb0a2f68644f5_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\.exe\shell\open\command 2024-02-18_d96014cb614ade63ba5fb0a2f68644f5_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\.exe\shell 2024-02-18_d96014cb614ade63ba5fb0a2f68644f5_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\.exe\DefaultIcon\ = "%1" 2024-02-18_d96014cb614ade63ba5fb0a2f68644f5_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\systemui\shell\runas\command 2024-02-18_d96014cb614ade63ba5fb0a2f68644f5_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\systemui\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-02-18_d96014cb614ade63ba5fb0a2f68644f5_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\.exe\ = "systemui" 2024-02-18_d96014cb614ade63ba5fb0a2f68644f5_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\systemui 2024-02-18_d96014cb614ade63ba5fb0a2f68644f5_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\systemui\shell 2024-02-18_d96014cb614ade63ba5fb0a2f68644f5_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\systemui\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_amd64\\dwmsys.exe\" /START \"%1\" %*" 2024-02-18_d96014cb614ade63ba5fb0a2f68644f5_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\systemui\shell\runas 2024-02-18_d96014cb614ade63ba5fb0a2f68644f5_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\.exe\shell\runas 2024-02-18_d96014cb614ade63ba5fb0a2f68644f5_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-02-18_d96014cb614ade63ba5fb0a2f68644f5_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-02-18_d96014cb614ade63ba5fb0a2f68644f5_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\systemui\DefaultIcon 2024-02-18_d96014cb614ade63ba5fb0a2f68644f5_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\systemui\shell\runas\command\ = "\"%1\" %*" 2024-02-18_d96014cb614ade63ba5fb0a2f68644f5_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\.exe\Content-Type = "application/x-msdownload" 2024-02-18_d96014cb614ade63ba5fb0a2f68644f5_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\systemui\ = "Application" 2024-02-18_d96014cb614ade63ba5fb0a2f68644f5_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\systemui\shell\open\command 2024-02-18_d96014cb614ade63ba5fb0a2f68644f5_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\.exe\shell\runas\command 2024-02-18_d96014cb614ade63ba5fb0a2f68644f5_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2760 dwmsys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2760 2232 2024-02-18_d96014cb614ade63ba5fb0a2f68644f5_mafia_nionspy.exe 28 PID 2232 wrote to memory of 2760 2232 2024-02-18_d96014cb614ade63ba5fb0a2f68644f5_mafia_nionspy.exe 28 PID 2232 wrote to memory of 2760 2232 2024-02-18_d96014cb614ade63ba5fb0a2f68644f5_mafia_nionspy.exe 28 PID 2232 wrote to memory of 2760 2232 2024-02-18_d96014cb614ade63ba5fb0a2f68644f5_mafia_nionspy.exe 28 PID 2760 wrote to memory of 2672 2760 dwmsys.exe 29 PID 2760 wrote to memory of 2672 2760 dwmsys.exe 29 PID 2760 wrote to memory of 2672 2760 dwmsys.exe 29 PID 2760 wrote to memory of 2672 2760 dwmsys.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-18_d96014cb614ade63ba5fb0a2f68644f5_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-18_d96014cb614ade63ba5fb0a2f68644f5_mafia_nionspy.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\dwmsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\dwmsys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\dwmsys.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\dwmsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\dwmsys.exe"3⤵
- Executes dropped EXE
PID:2672
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288KB
MD5860e69b489486f0aa39ec203f3e7e7d7
SHA1b24ce77782d2f656a123fc4f92c9589d32d4a9fb
SHA2565c8ada61831a287c045536250e8718a2828c0a199012766e5f4de1409d80f7db
SHA5127596d27730b0072906c182085599a51a6779309b2507f986cefe9f24903f368d52e118c14004a8f2eaa7d822f84ceac191977febcab2ca733996cb54e334fd85