Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
11/03/2024, 23:41
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe
-
Size
280KB
-
MD5
d27098c4a5832e5ca000cd0ef9fa3cff
-
SHA1
562849a7f7541a991f2b4c0296f2ce499702d411
-
SHA256
8108fb1975ea2d967fb1aa3bf9ffe546f552986c2fdf351c54484eed8c0fb82d
-
SHA512
bd0abe432c52b12d99ec02ed8692c18992500cfdb6af06373b9607eecf01c66ff42c2bbe4807e71595c5723ea532fe5f5c371f88f87796fd7636b9ce531cb18d
-
SSDEEP
6144:FTz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDK:FTBPFV0RyWl3h2E+7pl
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2528 SearchIndexerDB.exe 2584 SearchIndexerDB.exe -
Loads dropped DLL 4 IoCs
pid Process 1620 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe 1620 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe 1620 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe 2528 SearchIndexerDB.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 28 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\cmos\shell\open 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\ = "cmos" 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\Content-Type = "application/x-msdownload" 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\shell\open\command 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\cmos 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\cmos\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\cmos\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\cmos\shell 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\DefaultIcon 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\shell\runas 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\shell\open 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\cmos\DefaultIcon\ = "%1" 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\cmos\shell\runas 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\shell 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\cmos\shell\open\command 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\cmos\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\XMMC\\SearchIndexerDB.exe\" /START \"%1\" %*" 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\shell\runas\command 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\cmos\Content-Type = "application/x-msdownload" 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\cmos\shell\runas\command\ = "\"%1\" %*" 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\XMMC\\SearchIndexerDB.exe\" /START \"%1\" %*" 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\cmos\ = "Application" 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\cmos\DefaultIcon 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\cmos\shell\runas\command 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\DefaultIcon\ = "%1" 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2528 SearchIndexerDB.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2528 1620 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe 28 PID 1620 wrote to memory of 2528 1620 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe 28 PID 1620 wrote to memory of 2528 1620 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe 28 PID 1620 wrote to memory of 2528 1620 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe 28 PID 2528 wrote to memory of 2584 2528 SearchIndexerDB.exe 29 PID 2528 wrote to memory of 2584 2528 SearchIndexerDB.exe 29 PID 2528 wrote to memory of 2584 2528 SearchIndexerDB.exe 29 PID 2528 wrote to memory of 2584 2528 SearchIndexerDB.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\SearchIndexerDB.exe"C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\SearchIndexerDB.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\SearchIndexerDB.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\SearchIndexerDB.exe"C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\SearchIndexerDB.exe"3⤵
- Executes dropped EXE
PID:2584
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD5ea4ce3abdc4d302011a530a30bc0b484
SHA1cf262d4400adaa617eec714a5bd2c84edac7721c
SHA2562f071ae58c52a34046da8a38e17bc56592ae7602c0142376d47d20ea39af867f
SHA512a5826b20aa522a475eb65c94365cf659bcb45941ba98f513d15702c3ef01181b406d5524b405c0aef16ad9bf8060b8e7e3cc881a5e98f7421b8aaf9728e337d3