Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
127s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28/04/2024, 18:23
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe
-
Size
280KB
-
MD5
9da1535ab90319e996e2bed3b988e86d
-
SHA1
ecd84f7955b0f59d85eafbbe1be5523828b08819
-
SHA256
3728f85dc7c5eba1d063c2c874a13274166db0b8b6dcf6bc1352ae2f197e3660
-
SHA512
757a592067e58dc4b3465f6764c7160d12f97fd50dc4154a2e18444f3b1b90209f508926baf740829be876d034fcc8f8a8d3aa6d24c720e6c42d8c7a69e05ca5
-
SSDEEP
6144:kTz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDK:kTBPFV0RyWl3h2E+7pl
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe -
Executes dropped EXE 2 IoCs
pid Process 636 csrssys.exe 2352 csrssys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\wexplorer\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\.exe 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\wexplorer\DefaultIcon 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\wexplorer\shell\open 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\.exe\shell 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\wexplorer\DefaultIcon\ = "%1" 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\wexplorer\shell\runas\command 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\.exe\DefaultIcon 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\.exe\DefaultIcon\ = "%1" 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\wexplorer\Content-Type = "application/x-msdownload" 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\wexplorer\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SView\\csrssys.exe\" /START \"%1\" %*" 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\Local Settings 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\wexplorer 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\.exe\shell\open\command 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\wexplorer\shell\runas\command\ = "\"%1\" %*" 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\wexplorer\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\.exe\ = "wexplorer" 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\.exe\shell\open 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\wexplorer\shell\open\command 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\wexplorer\shell\runas 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\wexplorer\ = "Application" 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\.exe\Content-Type = "application/x-msdownload" 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\wexplorer\shell 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\.exe\shell\runas\command 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SView\\csrssys.exe\" /START \"%1\" %*" 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\.exe\shell\runas 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 636 csrssys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2876 wrote to memory of 636 2876 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe 85 PID 2876 wrote to memory of 636 2876 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe 85 PID 2876 wrote to memory of 636 2876 2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe 85 PID 636 wrote to memory of 2352 636 csrssys.exe 86 PID 636 wrote to memory of 2352 636 csrssys.exe 86 PID 636 wrote to memory of 2352 636 csrssys.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-28_9da1535ab90319e996e2bed3b988e86d_mafia_nionspy.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Roaming\Microsoft\SView\csrssys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SView\csrssys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SView\csrssys.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Roaming\Microsoft\SView\csrssys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SView\csrssys.exe"3⤵
- Executes dropped EXE
PID:2352
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD51ff1b24f2d048397eb99f8734eaf2355
SHA11565e3883bf2097f65588bbbbe4fcabb41723654
SHA256f0d562f6a939c25f9c7e73bb74245367790808465ba43057248b6905123740aa
SHA512c6ce2e5bb98aa2b578ac11076c865aba3d10b47ee001466a3c8b277908e6a1f417d4587740bcfa87ba05cdc38ebad3bd2bef9ee98f8fdbddd4d6eedd4f38e9df