Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
126s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/03/2024, 03:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe
-
Size
327KB
-
MD5
54ee3d2432813690107c7f285452ff07
-
SHA1
d7fa120aec83fad6d2f981cb62b71149734c8058
-
SHA256
ba8c620235ff086250e9788dd5e6ecba7785c355715779486c94278a8c35148f
-
SHA512
bdd161645e989121ecfd9d3c78863862849c6ff909698488ad0b5ad1ae864ff68a8f534aaa5f5cd18f544537491461b86de9f34e022f50a1f65a9a4d289c0e08
-
SSDEEP
6144:m2+JS2sFafI8U0obHCW/2a7XQcsPMjVWrG8KgbPzDh:m2TFafJiHCWBWPMjVWrXK0
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2548 sidebar2.exe 2788 sidebar2.exe -
Loads dropped DLL 3 IoCs
pid Process 2036 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe 2036 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe 2036 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 28 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\prochost\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\.exe\ = "prochost" 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\prochost\DefaultIcon\ = "%1" 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\prochost\shell 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\.exe\shell\open\command 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\.exe\shell 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\prochost 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\.exe\shell\runas 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\prochost\shell\open\command 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\prochost\shell\runas\command 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\prochost\DefaultIcon 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\prochost\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Sys32\\sidebar2.exe\" /START \"%1\" %*" 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\prochost\shell\open 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\prochost\shell\runas 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\.exe\DefaultIcon\ = "%1" 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\.exe\shell\open 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\prochost\ = "Application" 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\prochost\shell\runas\command\ = "\"%1\" %*" 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\.exe 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\.exe\Content-Type = "application/x-msdownload" 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\.exe\DefaultIcon 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Sys32\\sidebar2.exe\" /START \"%1\" %*" 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\prochost\Content-Type = "application/x-msdownload" 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\prochost\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\.exe\shell\runas\command 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2548 sidebar2.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2036 wrote to memory of 2548 2036 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe 28 PID 2036 wrote to memory of 2548 2036 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe 28 PID 2036 wrote to memory of 2548 2036 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe 28 PID 2036 wrote to memory of 2548 2036 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe 28 PID 2548 wrote to memory of 2788 2548 sidebar2.exe 29 PID 2548 wrote to memory of 2788 2548 sidebar2.exe 29 PID 2548 wrote to memory of 2788 2548 sidebar2.exe 29 PID 2548 wrote to memory of 2788 2548 sidebar2.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\sidebar2.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\sidebar2.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\sidebar2.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\sidebar2.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\sidebar2.exe"3⤵
- Executes dropped EXE
PID:2788
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
327KB
MD5088448ae27d7bdb0c2633dafe660150f
SHA1a25602552b323cd70f5920d434454a0ac1d8ade8
SHA256de80c46f9947b3af38744f3386873e181cb5211bc661153e28f561c50c1ce595
SHA512005906ede3de919b0a668ba99514200b803203d7c450c8f7a603f3842fe704c4716e58c0a206d281cb1e156d814983ac129415a08916b07f598e077a815725ba