Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    30/04/2024, 20:10

General

  • Target

    2024-04-30_a83a2ee8d86adc09f099753ebe9e305a_mafia_nionspy.exe

  • Size

    280KB

  • MD5

    a83a2ee8d86adc09f099753ebe9e305a

  • SHA1

    6c2437962adbd7cc57d1cd5d927478b2ff481f6b

  • SHA256

    364637aa422c4944780ca5eac13235c0a2e0266d6617b1f6f1fcbd7989f08955

  • SHA512

    5fae43ab00fc49491c936d46a185c6c2f6f810e5dfe1d5c04497a9511d6ccf635466a58dcebb2cac2d1c047fce1c8ec967074f05e16d10b5b405b827e5defb1c

  • SSDEEP

    6144:nTz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDK:nTBPFV0RyWl3h2E+7pl

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-30_a83a2ee8d86adc09f099753ebe9e305a_mafia_nionspy.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-30_a83a2ee8d86adc09f099753ebe9e305a_mafia_nionspy.exe"
    1⤵
    • Loads dropped DLL
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\winit32.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\winit32.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\winit32.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2828
      • C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\winit32.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\winit32.exe"
        3⤵
        • Executes dropped EXE
        PID:2760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\Microsoft\XMMC\winit32.exe

    Filesize

    280KB

    MD5

    8b8331293d0cf59233e2de621003a9bb

    SHA1

    893f91dc45fcbd6c8030fbeb512000e40576fb0d

    SHA256

    3c5cba268dfdd09142ccacdefaefb2e4ab8cf487ad87879b5e9dd4da061f56e2

    SHA512

    069b0c2cb0dfcb2a3d4dbd364f72af7002f2ca8e6654e762657b7101b1845c6b98f9df34ebab26f2ac10e02aac6abef9b131f4f355723fc8896937536a67e04a