Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    12/03/2024, 16:23

General

  • Target

    2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe

  • Size

    280KB

  • MD5

    bd064cceb30c463ab124ac71de63e091

  • SHA1

    aba52d356e8753a0122c4b4f219b19b77af86c9f

  • SHA256

    ba4094786add3c3d50af6702f9d71c5993e6b9a81587981a2e4d8ffc20969648

  • SHA512

    f9f158ad3f0997264532b3b4fcedea78bebaa2412751e6de7c0cb41736aeeb3beaafa0fafefedd4b43c1fd1942d19fa2948e2e36715ef293def8ed541b9351cc

  • SSDEEP

    6144:6Q+Tyfx4NF67Sbq2nW82X45gc3BaLZVS0mOoC8zbzDie:6QMyfmNFHfnWfhLZVHmOog

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe"
    1⤵
    • Loads dropped DLL
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\csrssys.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\csrssys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\csrssys.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2552
      • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\csrssys.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\csrssys.exe"
        3⤵
        • Executes dropped EXE
        PID:2696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\csrssys.exe

    Filesize

    280KB

    MD5

    97cdbc4f3afa372c7e4e753488d7749c

    SHA1

    3010b96f3c9e5460af9ad18ae7dbfc8bbd1165af

    SHA256

    1496ebfcb8e42aa114067e73422e68a6fec40f928b64dcec946e543d4a005ea6

    SHA512

    eb103b2d5229f31b04370216eb4c20aeeeb2239b4d9a3553b38bbff9a4e715c592a37b8fbeba57b5f3d108d9888665a0d174333ce8ec9690e0e2722058e6969f