Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2024, 03:40
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-09_be5044c08a39470a38cb8a59a3e07437_mafia_nionspy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-09_be5044c08a39470a38cb8a59a3e07437_mafia_nionspy.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-09_be5044c08a39470a38cb8a59a3e07437_mafia_nionspy.exe
-
Size
280KB
-
MD5
be5044c08a39470a38cb8a59a3e07437
-
SHA1
46e1c7d5f5fed114ff9fe569722a6da58ec952e5
-
SHA256
a7a3a9eff00e36038d29cfd8d39ffc9a4943fcb9e4374a4095abe1df015e0f6d
-
SHA512
908e6163e9e115cbdb7d73a73fd04b2505fdcd4d42e781ecf88c87512f2258269cabc7e1f129bf7b44b769216959a68fe87bc5c2227588265d720f2c758cfc37
-
SSDEEP
6144:gTz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDK:gTBPFV0RyWl3h2E+7pl
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2024-03-09_be5044c08a39470a38cb8a59a3e07437_mafia_nionspy.exe -
Executes dropped EXE 2 IoCs
pid Process 1432 dwmsys.exe 3616 dwmsys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\shell\open 2024-03-09_be5044c08a39470a38cb8a59a3e07437_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\open\command 2024-03-09_be5044c08a39470a38cb8a59a3e07437_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-03-09_be5044c08a39470a38cb8a59a3e07437_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\runas 2024-03-09_be5044c08a39470a38cb8a59a3e07437_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\ = "Application" 2024-03-09_be5044c08a39470a38cb8a59a3e07437_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\Content-Type = "application/x-msdownload" 2024-03-09_be5044c08a39470a38cb8a59a3e07437_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\shell\runas\command 2024-03-09_be5044c08a39470a38cb8a59a3e07437_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\Content-Type = "application/x-msdownload" 2024-03-09_be5044c08a39470a38cb8a59a3e07437_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_amd64\\dwmsys.exe\" /START \"%1\" %*" 2024-03-09_be5044c08a39470a38cb8a59a3e07437_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\DefaultIcon\ = "%1" 2024-03-09_be5044c08a39470a38cb8a59a3e07437_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-03-09_be5044c08a39470a38cb8a59a3e07437_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\shell\runas 2024-03-09_be5044c08a39470a38cb8a59a3e07437_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell 2024-03-09_be5044c08a39470a38cb8a59a3e07437_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\open 2024-03-09_be5044c08a39470a38cb8a59a3e07437_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\runas\command 2024-03-09_be5044c08a39470a38cb8a59a3e07437_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\shell\runas\command\ = "\"%1\" %*" 2024-03-09_be5044c08a39470a38cb8a59a3e07437_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe 2024-03-09_be5044c08a39470a38cb8a59a3e07437_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-03-09_be5044c08a39470a38cb8a59a3e07437_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver 2024-03-09_be5044c08a39470a38cb8a59a3e07437_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\DefaultIcon 2024-03-09_be5044c08a39470a38cb8a59a3e07437_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\shell\open\command 2024-03-09_be5044c08a39470a38cb8a59a3e07437_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-03-09_be5044c08a39470a38cb8a59a3e07437_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\DefaultIcon 2024-03-09_be5044c08a39470a38cb8a59a3e07437_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\shell 2024-03-09_be5044c08a39470a38cb8a59a3e07437_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\ = "ntdriver" 2024-03-09_be5044c08a39470a38cb8a59a3e07437_mafia_nionspy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2024-03-09_be5044c08a39470a38cb8a59a3e07437_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2024-03-09_be5044c08a39470a38cb8a59a3e07437_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_amd64\\dwmsys.exe\" /START \"%1\" %*" 2024-03-09_be5044c08a39470a38cb8a59a3e07437_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\DefaultIcon\ = "%1" 2024-03-09_be5044c08a39470a38cb8a59a3e07437_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 2024-03-09_be5044c08a39470a38cb8a59a3e07437_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1432 dwmsys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4236 wrote to memory of 1432 4236 2024-03-09_be5044c08a39470a38cb8a59a3e07437_mafia_nionspy.exe 99 PID 4236 wrote to memory of 1432 4236 2024-03-09_be5044c08a39470a38cb8a59a3e07437_mafia_nionspy.exe 99 PID 4236 wrote to memory of 1432 4236 2024-03-09_be5044c08a39470a38cb8a59a3e07437_mafia_nionspy.exe 99 PID 1432 wrote to memory of 3616 1432 dwmsys.exe 100 PID 1432 wrote to memory of 3616 1432 dwmsys.exe 100 PID 1432 wrote to memory of 3616 1432 dwmsys.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-09_be5044c08a39470a38cb8a59a3e07437_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-09_be5044c08a39470a38cb8a59a3e07437_mafia_nionspy.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\dwmsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\dwmsys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\dwmsys.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\dwmsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\dwmsys.exe"3⤵
- Executes dropped EXE
PID:3616
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4092 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:81⤵PID:2116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD581c3216bf90aa7e5496035edb491ba44
SHA176f52a6ddb300bdfb4fa59989d382fc5b5ad9140
SHA256ca24814b91775885a3b24b7ee371b10f3c3fc87e2ab7f046f865007512a8d33b
SHA5120234a509223cd30691000bb0f55d5c4e1ee94013b0563c77ed9a1c2cc5c685d8fdebe110c1549ccf77872b628aa7789e7e9dddb501c6053a357fc8653deb2652