Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/03/2024, 16:23
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe
-
Size
280KB
-
MD5
bd064cceb30c463ab124ac71de63e091
-
SHA1
aba52d356e8753a0122c4b4f219b19b77af86c9f
-
SHA256
ba4094786add3c3d50af6702f9d71c5993e6b9a81587981a2e4d8ffc20969648
-
SHA512
f9f158ad3f0997264532b3b4fcedea78bebaa2412751e6de7c0cb41736aeeb3beaafa0fafefedd4b43c1fd1942d19fa2948e2e36715ef293def8ed541b9351cc
-
SSDEEP
6144:6Q+Tyfx4NF67Sbq2nW82X45gc3BaLZVS0mOoC8zbzDie:6QMyfmNFHfnWfhLZVHmOog
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2552 csrssys.exe 2696 csrssys.exe -
Loads dropped DLL 3 IoCs
pid Process 2032 2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe 2032 2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe 2032 2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 28 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.exe\ = "wexplorer" 2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\wexplorer\Content-Type = "application/x-msdownload" 2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\wexplorer\DefaultIcon 2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\wexplorer\shell\open 2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\wexplorer\shell\open\command 2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\wexplorer\shell\runas\command 2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\wexplorer\shell\runas 2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\wexplorer\shell\runas\command\ = "\"%1\" %*" 2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.exe\shell\open 2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\wexplorer\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_x86_64\\csrssys.exe\" /START \"%1\" %*" 2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.exe 2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.exe\shell\open\command 2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.exe\DefaultIcon 2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" 2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.exe\shell\runas 2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\wexplorer\shell 2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\wexplorer\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\wexplorer\DefaultIcon\ = "%1" 2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_x86_64\\csrssys.exe\" /START \"%1\" %*" 2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.exe\Content-Type = "application/x-msdownload" 2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.exe\DefaultIcon\ = "%1" 2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.exe\shell 2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.exe\shell\runas\command 2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\wexplorer 2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\wexplorer\ = "Application" 2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\wexplorer\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2552 csrssys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2552 2032 2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe 28 PID 2032 wrote to memory of 2552 2032 2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe 28 PID 2032 wrote to memory of 2552 2032 2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe 28 PID 2032 wrote to memory of 2552 2032 2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe 28 PID 2552 wrote to memory of 2696 2552 csrssys.exe 29 PID 2552 wrote to memory of 2696 2552 csrssys.exe 29 PID 2552 wrote to memory of 2696 2552 csrssys.exe 29 PID 2552 wrote to memory of 2696 2552 csrssys.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-12_bd064cceb30c463ab124ac71de63e091_mafia_nionspy.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\csrssys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\csrssys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\csrssys.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\csrssys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\csrssys.exe"3⤵
- Executes dropped EXE
PID:2696
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD597cdbc4f3afa372c7e4e753488d7749c
SHA13010b96f3c9e5460af9ad18ae7dbfc8bbd1165af
SHA2561496ebfcb8e42aa114067e73422e68a6fec40f928b64dcec946e543d4a005ea6
SHA512eb103b2d5229f31b04370216eb4c20aeeeb2239b4d9a3553b38bbff9a4e715c592a37b8fbeba57b5f3d108d9888665a0d174333ce8ec9690e0e2722058e6969f