Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
123s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/02/2024, 00:57
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-29_ead23e80921e44fa779c8fe6a114539a_mafia_nionspy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-29_ead23e80921e44fa779c8fe6a114539a_mafia_nionspy.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-02-29_ead23e80921e44fa779c8fe6a114539a_mafia_nionspy.exe
-
Size
288KB
-
MD5
ead23e80921e44fa779c8fe6a114539a
-
SHA1
253c7c82be38fe05317d8238425af43cb4c7f253
-
SHA256
ff4672c7dfa986053e0b8ed31c9dd7e62f181ba2c50c40a76751aab5ab759239
-
SHA512
129046a1ae831228f41d115b6f1ed8382523fa5928b215ed3d4b8b1370fad0a87b56bcb45bec50e82c4db979d03209b9795f3be57ca0d1f34ed2e281016d2f42
-
SSDEEP
6144:NQ+Tyfx4NF67Sbq2nW82X45gc3BaLZVS0mOoC8zbzDie:NQMyfmNFHfnWfhLZVHmOog
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1880 csrssys.exe 3008 csrssys.exe -
Loads dropped DLL 4 IoCs
pid Process 1688 2024-02-29_ead23e80921e44fa779c8fe6a114539a_mafia_nionspy.exe 1688 2024-02-29_ead23e80921e44fa779c8fe6a114539a_mafia_nionspy.exe 1688 2024-02-29_ead23e80921e44fa779c8fe6a114539a_mafia_nionspy.exe 1880 csrssys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 28 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\wexplorer\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-02-29_ead23e80921e44fa779c8fe6a114539a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\shell 2024-02-29_ead23e80921e44fa779c8fe6a114539a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe 2024-02-29_ead23e80921e44fa779c8fe6a114539a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-02-29_ead23e80921e44fa779c8fe6a114539a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\wexplorer\ = "Application" 2024-02-29_ead23e80921e44fa779c8fe6a114539a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\wexplorer\Content-Type = "application/x-msdownload" 2024-02-29_ead23e80921e44fa779c8fe6a114539a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\wexplorer\DefaultIcon 2024-02-29_ead23e80921e44fa779c8fe6a114539a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\wexplorer\shell\open\command 2024-02-29_ead23e80921e44fa779c8fe6a114539a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\wexplorer\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-02-29_ead23e80921e44fa779c8fe6a114539a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\shell\runas 2024-02-29_ead23e80921e44fa779c8fe6a114539a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\wexplorer\DefaultIcon\ = "%1" 2024-02-29_ead23e80921e44fa779c8fe6a114539a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\wexplorer\shell\open 2024-02-29_ead23e80921e44fa779c8fe6a114539a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\Content-Type = "application/x-msdownload" 2024-02-29_ead23e80921e44fa779c8fe6a114539a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\shell\open\command 2024-02-29_ead23e80921e44fa779c8fe6a114539a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SView\\csrssys.exe\" /START \"%1\" %*" 2024-02-29_ead23e80921e44fa779c8fe6a114539a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\shell\runas\command 2024-02-29_ead23e80921e44fa779c8fe6a114539a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" 2024-02-29_ead23e80921e44fa779c8fe6a114539a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\DefaultIcon\ = "%1" 2024-02-29_ead23e80921e44fa779c8fe6a114539a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\wexplorer 2024-02-29_ead23e80921e44fa779c8fe6a114539a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\wexplorer\shell 2024-02-29_ead23e80921e44fa779c8fe6a114539a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\wexplorer\shell\runas\command 2024-02-29_ead23e80921e44fa779c8fe6a114539a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\wexplorer\shell\runas 2024-02-29_ead23e80921e44fa779c8fe6a114539a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\wexplorer\shell\runas\command\ = "\"%1\" %*" 2024-02-29_ead23e80921e44fa779c8fe6a114539a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\ = "wexplorer" 2024-02-29_ead23e80921e44fa779c8fe6a114539a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\wexplorer\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SView\\csrssys.exe\" /START \"%1\" %*" 2024-02-29_ead23e80921e44fa779c8fe6a114539a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\DefaultIcon 2024-02-29_ead23e80921e44fa779c8fe6a114539a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\shell\open 2024-02-29_ead23e80921e44fa779c8fe6a114539a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-02-29_ead23e80921e44fa779c8fe6a114539a_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1880 csrssys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1688 wrote to memory of 1880 1688 2024-02-29_ead23e80921e44fa779c8fe6a114539a_mafia_nionspy.exe 28 PID 1688 wrote to memory of 1880 1688 2024-02-29_ead23e80921e44fa779c8fe6a114539a_mafia_nionspy.exe 28 PID 1688 wrote to memory of 1880 1688 2024-02-29_ead23e80921e44fa779c8fe6a114539a_mafia_nionspy.exe 28 PID 1688 wrote to memory of 1880 1688 2024-02-29_ead23e80921e44fa779c8fe6a114539a_mafia_nionspy.exe 28 PID 1880 wrote to memory of 3008 1880 csrssys.exe 29 PID 1880 wrote to memory of 3008 1880 csrssys.exe 29 PID 1880 wrote to memory of 3008 1880 csrssys.exe 29 PID 1880 wrote to memory of 3008 1880 csrssys.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-29_ead23e80921e44fa779c8fe6a114539a_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-29_ead23e80921e44fa779c8fe6a114539a_mafia_nionspy.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Roaming\Microsoft\SView\csrssys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SView\csrssys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SView\csrssys.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Roaming\Microsoft\SView\csrssys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SView\csrssys.exe"3⤵
- Executes dropped EXE
PID:3008
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD510740276c2d72e7e904b471b3ae80fd4
SHA1a561f5573bee32e5939069653b624bd440cbb7d9
SHA2569389d278b4a6c261f10540b5ee32325381b9a0590332f9b7c06fce4e655cc5e3
SHA5121598185dac52ed14974436d7fc0c33b0ef874f28d792a855b4cfa12e1f646f8779007846ff14e30ba8bc24ba29dbddb519d8f00208d8c4dd0c3c54aa796bd240
-
Filesize
256KB
MD5382b25b6774be0ba48a9cb7cf7aec5b6
SHA16d5212f575ef872a671a01457ff51ab1ae3ffe7f
SHA2566458d7a949d51a820583994b977712949afab31453da9715de06f6b4a8775115
SHA512859f84a150367da66d8e786d2dda15091c97aeb50dfd1ab1bfc13f53117f14af83db5d4dbf4f9c5eed3918382c9285bc160760a6188784454805a9b0f67c942c
-
Filesize
288KB
MD53cc8fb723581cf0ea552b2260dfbc289
SHA18065fb590c14834951878ede669e6812a2b613ff
SHA256cd63d4e3db8898627bbf0968ee8c34b6be3731785eb5998cb946b2d99f718de0
SHA5127f7b31ebead616e8bb8a8aad5d2a45eb52c144ee8a29ca3aa2c233238412c2b1d380931909b007b635f9b510343b01a632cc171516c7636d3e79a80a7c211144