Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
127s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
28/04/2024, 18:23
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe
-
Size
280KB
-
MD5
9da1535ab90319e996e2bed3b988e86d
-
SHA1
ecd84f7955b0f59d85eafbbe1be5523828b08819
-
SHA256
3728f85dc7c5eba1d063c2c874a13274166db0b8b6dcf6bc1352ae2f197e3660
-
SHA512
757a592067e58dc4b3465f6764c7160d12f97fd50dc4154a2e18444f3b1b90209f508926baf740829be876d034fcc8f8a8d3aa6d24c720e6c42d8c7a69e05ca5
-
SSDEEP
6144:kTz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDK:kTBPFV0RyWl3h2E+7pl
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2128 csrssys.exe 2740 csrssys.exe -
Loads dropped DLL 4 IoCs
pid Process 2976 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe 2976 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe 2976 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe 2128 csrssys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 28 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\wexplorer\DefaultIcon 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\wexplorer\shell\open\command 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\wexplorer\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\.exe\ = "wexplorer" 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\.exe\shell\runas\command 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\.exe\shell 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\.exe\shell\runas 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\wexplorer 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\wexplorer\ = "Application" 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\wexplorer\shell 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\wexplorer\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SView\\csrssys.exe\" /START \"%1\" %*" 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\.exe\Content-Type = "application/x-msdownload" 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\wexplorer\shell\runas 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\wexplorer\shell\runas\command\ = "\"%1\" %*" 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\.exe\shell\open\command 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\wexplorer\shell\open 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\.exe\DefaultIcon\ = "%1" 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\wexplorer\Content-Type = "application/x-msdownload" 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\wexplorer\DefaultIcon\ = "%1" 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\wexplorer\shell\runas\command 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\.exe\shell\open 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SView\\csrssys.exe\" /START \"%1\" %*" 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\wexplorer\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\.exe\DefaultIcon 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\.exe 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2128 csrssys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2128 2976 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe 28 PID 2976 wrote to memory of 2128 2976 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe 28 PID 2976 wrote to memory of 2128 2976 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe 28 PID 2976 wrote to memory of 2128 2976 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe 28 PID 2128 wrote to memory of 2740 2128 csrssys.exe 29 PID 2128 wrote to memory of 2740 2128 csrssys.exe 29 PID 2128 wrote to memory of 2740 2128 csrssys.exe 29 PID 2128 wrote to memory of 2740 2128 csrssys.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Roaming\Microsoft\SView\csrssys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SView\csrssys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SView\csrssys.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Roaming\Microsoft\SView\csrssys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SView\csrssys.exe"3⤵
- Executes dropped EXE
PID:2740
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD51ff1b24f2d048397eb99f8734eaf2355
SHA11565e3883bf2097f65588bbbbe4fcabb41723654
SHA256f0d562f6a939c25f9c7e73bb74245367790808465ba43057248b6905123740aa
SHA512c6ce2e5bb98aa2b578ac11076c865aba3d10b47ee001466a3c8b277908e6a1f417d4587740bcfa87ba05cdc38ebad3bd2bef9ee98f8fdbddd4d6eedd4f38e9df