Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 23:41
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe
-
Size
280KB
-
MD5
d27098c4a5832e5ca000cd0ef9fa3cff
-
SHA1
562849a7f7541a991f2b4c0296f2ce499702d411
-
SHA256
8108fb1975ea2d967fb1aa3bf9ffe546f552986c2fdf351c54484eed8c0fb82d
-
SHA512
bd0abe432c52b12d99ec02ed8692c18992500cfdb6af06373b9607eecf01c66ff42c2bbe4807e71595c5723ea532fe5f5c371f88f87796fd7636b9ce531cb18d
-
SSDEEP
6144:FTz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDK:FTBPFV0RyWl3h2E+7pl
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe -
Executes dropped EXE 2 IoCs
pid Process 2556 SearchIndexerDB.exe 1376 SearchIndexerDB.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000_Classes\cmos\shell\open\command 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000_Classes\.exe\DefaultIcon\ = "%1" 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000_Classes\.exe\shell\open 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000_Classes\Local Settings 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000_Classes\cmos 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000_Classes\.exe\DefaultIcon 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SView\\SearchIndexerDB.exe\" /START \"%1\" %*" 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000_Classes\.exe\shell\runas 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000_Classes\cmos\DefaultIcon\ = "%1" 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000_Classes\cmos\shell\runas 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000_Classes\.exe\ = "cmos" 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000_Classes\.exe\shell\open\command 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000_Classes\cmos\Content-Type = "application/x-msdownload" 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000_Classes\cmos\shell\runas\command\ = "\"%1\" %*" 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000_Classes\cmos\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000_Classes\cmos\ = "Application" 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000_Classes\.exe 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000_Classes\.exe\Content-Type = "application/x-msdownload" 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000_Classes\.exe\shell 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000_Classes\cmos\DefaultIcon 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000_Classes\cmos\shell\open 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000_Classes\cmos\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SView\\SearchIndexerDB.exe\" /START \"%1\" %*" 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000_Classes\cmos\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000_Classes\.exe\shell\runas\command 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000_Classes\cmos\shell 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000_Classes\cmos\shell\runas\command 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2556 SearchIndexerDB.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1452 wrote to memory of 2556 1452 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe 91 PID 1452 wrote to memory of 2556 1452 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe 91 PID 1452 wrote to memory of 2556 1452 2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe 91 PID 2556 wrote to memory of 1376 2556 SearchIndexerDB.exe 92 PID 2556 wrote to memory of 1376 2556 SearchIndexerDB.exe 92 PID 2556 wrote to memory of 1376 2556 SearchIndexerDB.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-11_d27098c4a5832e5ca000cd0ef9fa3cff_mafia_nionspy.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Roaming\Microsoft\SView\SearchIndexerDB.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SView\SearchIndexerDB.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SView\SearchIndexerDB.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Roaming\Microsoft\SView\SearchIndexerDB.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SView\SearchIndexerDB.exe"3⤵
- Executes dropped EXE
PID:1376
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD5c0edcd2a2b2c255f232c51864ea0fe2d
SHA1005c4e7a42047e952cbce893ed7f39e4d8ff3808
SHA256f4bda1714e12dcc841c9946a86518be26ebc2b7945d4d00dd6559313e307d817
SHA512f489e58b84576e33463b5016d8841ac40322627c588c493bdbabd8f2c5e4895b29fad1a3d86092b658600ab6ec6d3088483a57762c96ccf7a59ff473b47a7502