Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18/03/2024, 23:47
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe
-
Size
344KB
-
MD5
f9f091755ec8e73248248dab8322d626
-
SHA1
e67c131ba30b9fcc039338a26120903f4481e137
-
SHA256
a683ca42892015abfce890026163ee73c199a2d602acc00e0e04a3bc71f428ad
-
SHA512
e6d5c1d6854c11b5be3197f643ef3bffc83af6ad87037a652f72c750d1014934a78b8ae7bbfead86446b08181eb1bb79cd33421c1f78381ea3c3fc05b737a9ad
-
SSDEEP
6144:+Tz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDBRm1+gmN:+TBPFV0RyWl3h2E+7pYm0
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe -
Executes dropped EXE 2 IoCs
pid Process 2352 wlogon32.exe 3712 wlogon32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\haldriver\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\haldriver\shell\runas\command\ = "\"%1\" %*" 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\.exe\ = "haldriver" 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\haldriver\DefaultIcon\ = "%1" 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\haldriver\shell 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\haldriver 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\haldriver\ = "Application" 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\haldriver\shell\runas\command 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\haldriver\shell\runas 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\Local Settings 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\haldriver\shell\open\command 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\.exe\Content-Type = "application/x-msdownload" 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\.exe\shell 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_32\\wlogon32.exe\" /START \"%1\" %*" 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\.exe\shell\runas 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\haldriver\DefaultIcon 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\haldriver\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_32\\wlogon32.exe\" /START \"%1\" %*" 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\.exe 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\.exe\DefaultIcon 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\.exe\DefaultIcon\ = "%1" 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\.exe\shell\open\command 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\.exe\shell\open 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\haldriver\Content-Type = "application/x-msdownload" 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\haldriver\shell\open 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\haldriver\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\.exe\shell\runas\command 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2352 wlogon32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2352 2244 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe 92 PID 2244 wrote to memory of 2352 2244 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe 92 PID 2244 wrote to memory of 2352 2244 2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe 92 PID 2352 wrote to memory of 3712 2352 wlogon32.exe 94 PID 2352 wrote to memory of 3712 2352 wlogon32.exe 94 PID 2352 wrote to memory of 3712 2352 wlogon32.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-18_f9f091755ec8e73248248dab8322d626_mafia_nionspy.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\wlogon32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\wlogon32.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\wlogon32.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\wlogon32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\wlogon32.exe"3⤵
- Executes dropped EXE
PID:3712
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD547d85af45b26c404d827ae92d4067378
SHA1c542542b1dcfa63c81fe80658888522580e274bb
SHA2569eff225ebbc999f1565a8e0eb2209f192ce5c0830697a4a83b5caba5b8c0a2d1
SHA512fff0e883847bd095d3988f24d525499d0288a353ae818814f52ce2bbfbf48c4a9e5e47623fec9c569df38693c1b7eff34d3438f3e29f04371b0d80410ee0a22b