Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 03:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe
-
Size
327KB
-
MD5
54ee3d2432813690107c7f285452ff07
-
SHA1
d7fa120aec83fad6d2f981cb62b71149734c8058
-
SHA256
ba8c620235ff086250e9788dd5e6ecba7785c355715779486c94278a8c35148f
-
SHA512
bdd161645e989121ecfd9d3c78863862849c6ff909698488ad0b5ad1ae864ff68a8f534aaa5f5cd18f544537491461b86de9f34e022f50a1f65a9a4d289c0e08
-
SSDEEP
6144:m2+JS2sFafI8U0obHCW/2a7XQcsPMjVWrG8KgbPzDh:m2TFafJiHCWBWPMjVWrXK0
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe -
Executes dropped EXE 2 IoCs
pid Process 556 csrssys.exe 4220 csrssys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\wexplorer\shell\runas\command\ = "\"%1\" %*" 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\.exe 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\.exe\shell\open\command 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\.exe\shell\runas 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\wexplorer\Content-Type = "application/x-msdownload" 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\wexplorer\shell 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\wexplorer\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SView\\csrssys.exe\" /START \"%1\" %*" 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\.exe\ = "wexplorer" 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\.exe\shell\open 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SView\\csrssys.exe\" /START \"%1\" %*" 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\wexplorer\DefaultIcon\ = "%1" 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\wexplorer\shell\open\command 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\wexplorer\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\.exe\shell 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\wexplorer\DefaultIcon 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\wexplorer\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\wexplorer\shell\runas\command 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\wexplorer 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\.exe\shell\runas\command 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\Local Settings 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\wexplorer\ = "Application" 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\wexplorer\shell\runas 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\.exe\Content-Type = "application/x-msdownload" 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\.exe\DefaultIcon\ = "%1" 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\wexplorer\shell\open 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\.exe\DefaultIcon 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 556 csrssys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4604 wrote to memory of 556 4604 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe 89 PID 4604 wrote to memory of 556 4604 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe 89 PID 4604 wrote to memory of 556 4604 2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe 89 PID 556 wrote to memory of 4220 556 csrssys.exe 90 PID 556 wrote to memory of 4220 556 csrssys.exe 90 PID 556 wrote to memory of 4220 556 csrssys.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-13_54ee3d2432813690107c7f285452ff07_mafia_nionspy.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Roaming\Microsoft\SView\csrssys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SView\csrssys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SView\csrssys.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Users\Admin\AppData\Roaming\Microsoft\SView\csrssys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SView\csrssys.exe"3⤵
- Executes dropped EXE
PID:4220
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
327KB
MD53320a6485c996e398f286b4b6e77ec53
SHA1e47cb3f6eabcd3672b77dd3ddf7f35e72dc24d96
SHA25688b495f87f1ec8a12dee88e8067fc2aadbcb9ae6b47e2484152479ceca3f397d
SHA5129bfa7752aa3225ec1cd11efd272bad35851a07de9cce2e6db05caddc4cc00bbfc8993d29ae146b767eb37ca0c1eba6d12eaa090d4742d50fce0121299b0b410f