Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 13:22
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-15_97609dd78a93eb9c1be3f97d14bdff76_mafia_nionspy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-15_97609dd78a93eb9c1be3f97d14bdff76_mafia_nionspy.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-15_97609dd78a93eb9c1be3f97d14bdff76_mafia_nionspy.exe
-
Size
274KB
-
MD5
97609dd78a93eb9c1be3f97d14bdff76
-
SHA1
de58b6b299cb257e94d829b53a103383358574c0
-
SHA256
ba49b26a393adb7082c4b71a85a673fb5247bad4fcf9cb2c4a904d2a507a6f10
-
SHA512
0d5ed5197de31c50320b83863c1e81791b4fc23cff540ec1043b0334ce0a46dbd278c854f6819e26151b3b48b85adc5a52f260f86065b8c79ee88b0a9ef91822
-
SSDEEP
6144:JYvZ6brUj+bvqHXSpWr2Kqz83Oad3Jg4PlPDIQ+KLzDDg:JYvEbrUjp3SpWggd3JBPlPDIQ3g
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2420 lsassys.exe 2752 lsassys.exe -
Loads dropped DLL 4 IoCs
pid Process 1660 2024-04-15_97609dd78a93eb9c1be3f97d14bdff76_mafia_nionspy.exe 1660 2024-04-15_97609dd78a93eb9c1be3f97d14bdff76_mafia_nionspy.exe 1660 2024-04-15_97609dd78a93eb9c1be3f97d14bdff76_mafia_nionspy.exe 2420 lsassys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 28 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\halnt\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-04-15_97609dd78a93eb9c1be3f97d14bdff76_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\.exe 2024-04-15_97609dd78a93eb9c1be3f97d14bdff76_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\halnt 2024-04-15_97609dd78a93eb9c1be3f97d14bdff76_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\halnt\Content-Type = "application/x-msdownload" 2024-04-15_97609dd78a93eb9c1be3f97d14bdff76_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\.exe\shell\open\command 2024-04-15_97609dd78a93eb9c1be3f97d14bdff76_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\.exe\shell\runas\command 2024-04-15_97609dd78a93eb9c1be3f97d14bdff76_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\.exe\shell\runas 2024-04-15_97609dd78a93eb9c1be3f97d14bdff76_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\halnt\DefaultIcon\ = "%1" 2024-04-15_97609dd78a93eb9c1be3f97d14bdff76_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\halnt\shell\open 2024-04-15_97609dd78a93eb9c1be3f97d14bdff76_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\halnt\ = "Application" 2024-04-15_97609dd78a93eb9c1be3f97d14bdff76_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\halnt\DefaultIcon 2024-04-15_97609dd78a93eb9c1be3f97d14bdff76_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\halnt\shell\open\command 2024-04-15_97609dd78a93eb9c1be3f97d14bdff76_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\halnt\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\XMMC\\lsassys.exe\" /START \"%1\" %*" 2024-04-15_97609dd78a93eb9c1be3f97d14bdff76_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\.exe\ = "halnt" 2024-04-15_97609dd78a93eb9c1be3f97d14bdff76_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" 2024-04-15_97609dd78a93eb9c1be3f97d14bdff76_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\halnt\shell\runas\command 2024-04-15_97609dd78a93eb9c1be3f97d14bdff76_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\halnt\shell\runas 2024-04-15_97609dd78a93eb9c1be3f97d14bdff76_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\halnt\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-04-15_97609dd78a93eb9c1be3f97d14bdff76_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\.exe\DefaultIcon\ = "%1" 2024-04-15_97609dd78a93eb9c1be3f97d14bdff76_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\.exe\shell 2024-04-15_97609dd78a93eb9c1be3f97d14bdff76_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\.exe\shell\open 2024-04-15_97609dd78a93eb9c1be3f97d14bdff76_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\halnt\shell\runas\command\ = "\"%1\" %*" 2024-04-15_97609dd78a93eb9c1be3f97d14bdff76_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\.exe\DefaultIcon 2024-04-15_97609dd78a93eb9c1be3f97d14bdff76_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-04-15_97609dd78a93eb9c1be3f97d14bdff76_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\.exe\Content-Type = "application/x-msdownload" 2024-04-15_97609dd78a93eb9c1be3f97d14bdff76_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\halnt\shell 2024-04-15_97609dd78a93eb9c1be3f97d14bdff76_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\XMMC\\lsassys.exe\" /START \"%1\" %*" 2024-04-15_97609dd78a93eb9c1be3f97d14bdff76_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-04-15_97609dd78a93eb9c1be3f97d14bdff76_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2420 lsassys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1660 wrote to memory of 2420 1660 2024-04-15_97609dd78a93eb9c1be3f97d14bdff76_mafia_nionspy.exe 28 PID 1660 wrote to memory of 2420 1660 2024-04-15_97609dd78a93eb9c1be3f97d14bdff76_mafia_nionspy.exe 28 PID 1660 wrote to memory of 2420 1660 2024-04-15_97609dd78a93eb9c1be3f97d14bdff76_mafia_nionspy.exe 28 PID 1660 wrote to memory of 2420 1660 2024-04-15_97609dd78a93eb9c1be3f97d14bdff76_mafia_nionspy.exe 28 PID 2420 wrote to memory of 2752 2420 lsassys.exe 29 PID 2420 wrote to memory of 2752 2420 lsassys.exe 29 PID 2420 wrote to memory of 2752 2420 lsassys.exe 29 PID 2420 wrote to memory of 2752 2420 lsassys.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_97609dd78a93eb9c1be3f97d14bdff76_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-15_97609dd78a93eb9c1be3f97d14bdff76_mafia_nionspy.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\lsassys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\lsassys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\lsassys.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\lsassys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\lsassys.exe"3⤵
- Executes dropped EXE
PID:2752
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274KB
MD56d8b56a77d2f3d53254ba287c72b7909
SHA1ce49aa2e049727fe582839532abf0b8c997a3127
SHA2562b4c81809b41e37b266b20cfcd39a3137a73f3656eefab5b146411b2dcc12191
SHA512f124b6420fd14c7963ed03f2e006cbbc3bd0f4c3ad52ce5b6e1bfd4eb07f2523b7f1c8d63482d57bd6e9fea5c850bf9ecd8ff48f57f3dbbb2e110af3de0ff130