Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
128s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 09:45
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-15_1e0678d36bb6c1c3cd7397b6e27bca9d_mafia_nionspy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-15_1e0678d36bb6c1c3cd7397b6e27bca9d_mafia_nionspy.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-15_1e0678d36bb6c1c3cd7397b6e27bca9d_mafia_nionspy.exe
-
Size
280KB
-
MD5
1e0678d36bb6c1c3cd7397b6e27bca9d
-
SHA1
5d57c2f06d328c00e31ceb1a7e364f8b5e3bdfe4
-
SHA256
45a0aa9c2d2d659bb97b37090ed605f862cfc0e9ee0ebdf7814f429046e19ff2
-
SHA512
be61c1def6fc57d9fe6739c1a33cf4f9f1ccf8005cfd6c3b2f1c641043861b2b90d8ab98b4087e201f2d9191d7596262f7012fad78b01b16671cea2a984e6cc4
-
SSDEEP
6144:RQ+Tyfx4NF67Sbq2nW82X45gc3BaLZVS0mOoC8zbzDie:RQMyfmNFHfnWfhLZVHmOog
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2604 lsassys.exe 2608 lsassys.exe -
Loads dropped DLL 3 IoCs
pid Process 2928 2024-03-15_1e0678d36bb6c1c3cd7397b6e27bca9d_mafia_nionspy.exe 2928 2024-03-15_1e0678d36bb6c1c3cd7397b6e27bca9d_mafia_nionspy.exe 2928 2024-03-15_1e0678d36bb6c1c3cd7397b6e27bca9d_mafia_nionspy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 28 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\halnt\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Posix\\lsassys.exe\" /START \"%1\" %*" 2024-03-15_1e0678d36bb6c1c3cd7397b6e27bca9d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.exe\ = "halnt" 2024-03-15_1e0678d36bb6c1c3cd7397b6e27bca9d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.exe\DefaultIcon\ = "%1" 2024-03-15_1e0678d36bb6c1c3cd7397b6e27bca9d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\halnt\shell 2024-03-15_1e0678d36bb6c1c3cd7397b6e27bca9d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\halnt\DefaultIcon\ = "%1" 2024-03-15_1e0678d36bb6c1c3cd7397b6e27bca9d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\halnt\DefaultIcon 2024-03-15_1e0678d36bb6c1c3cd7397b6e27bca9d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\halnt\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-03-15_1e0678d36bb6c1c3cd7397b6e27bca9d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\halnt\shell\runas\command 2024-03-15_1e0678d36bb6c1c3cd7397b6e27bca9d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.exe\shell\open\command 2024-03-15_1e0678d36bb6c1c3cd7397b6e27bca9d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\halnt 2024-03-15_1e0678d36bb6c1c3cd7397b6e27bca9d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\halnt\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-03-15_1e0678d36bb6c1c3cd7397b6e27bca9d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" 2024-03-15_1e0678d36bb6c1c3cd7397b6e27bca9d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\halnt\shell\open\command 2024-03-15_1e0678d36bb6c1c3cd7397b6e27bca9d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.exe\Content-Type = "application/x-msdownload" 2024-03-15_1e0678d36bb6c1c3cd7397b6e27bca9d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.exe\shell\open 2024-03-15_1e0678d36bb6c1c3cd7397b6e27bca9d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.exe 2024-03-15_1e0678d36bb6c1c3cd7397b6e27bca9d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.exe\shell 2024-03-15_1e0678d36bb6c1c3cd7397b6e27bca9d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.exe\shell\runas\command 2024-03-15_1e0678d36bb6c1c3cd7397b6e27bca9d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\halnt\shell\open 2024-03-15_1e0678d36bb6c1c3cd7397b6e27bca9d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.exe\DefaultIcon 2024-03-15_1e0678d36bb6c1c3cd7397b6e27bca9d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.exe\shell\runas 2024-03-15_1e0678d36bb6c1c3cd7397b6e27bca9d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-03-15_1e0678d36bb6c1c3cd7397b6e27bca9d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\halnt\ = "Application" 2024-03-15_1e0678d36bb6c1c3cd7397b6e27bca9d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\halnt\shell\runas 2024-03-15_1e0678d36bb6c1c3cd7397b6e27bca9d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\halnt\shell\runas\command\ = "\"%1\" %*" 2024-03-15_1e0678d36bb6c1c3cd7397b6e27bca9d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Posix\\lsassys.exe\" /START \"%1\" %*" 2024-03-15_1e0678d36bb6c1c3cd7397b6e27bca9d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-03-15_1e0678d36bb6c1c3cd7397b6e27bca9d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\halnt\Content-Type = "application/x-msdownload" 2024-03-15_1e0678d36bb6c1c3cd7397b6e27bca9d_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2604 lsassys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2604 2928 2024-03-15_1e0678d36bb6c1c3cd7397b6e27bca9d_mafia_nionspy.exe 27 PID 2928 wrote to memory of 2604 2928 2024-03-15_1e0678d36bb6c1c3cd7397b6e27bca9d_mafia_nionspy.exe 27 PID 2928 wrote to memory of 2604 2928 2024-03-15_1e0678d36bb6c1c3cd7397b6e27bca9d_mafia_nionspy.exe 27 PID 2928 wrote to memory of 2604 2928 2024-03-15_1e0678d36bb6c1c3cd7397b6e27bca9d_mafia_nionspy.exe 27 PID 2604 wrote to memory of 2608 2604 lsassys.exe 28 PID 2604 wrote to memory of 2608 2604 lsassys.exe 28 PID 2604 wrote to memory of 2608 2604 lsassys.exe 28 PID 2604 wrote to memory of 2608 2604 lsassys.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-15_1e0678d36bb6c1c3cd7397b6e27bca9d_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-15_1e0678d36bb6c1c3cd7397b6e27bca9d_mafia_nionspy.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Roaming\Microsoft\Posix\lsassys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Posix\lsassys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\lsassys.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Roaming\Microsoft\Posix\lsassys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Posix\lsassys.exe"3⤵
- Executes dropped EXE
PID:2608
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD52d68de3ffcd06617f8a54d4bf306aacd
SHA1619a599522fc48ada7b0214746cf8851ec1c3d3a
SHA25668a41a7a81d14c0d009ccc5c8a73550a5377b1705e2ec7530a10cf3384691787
SHA5123ac6306c9885359766f33bb921d889c76319a5f7850baf4159a4b801d1a27c69429d736a3388cc82877de6152011a0cbaa7dc3194dcb9adf172a1a8a1d07a013