Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    126s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/04/2024, 20:10

General

  • Target

    2024-04-30_a83a2ee8d86adc09f099753ebe9e305a_mafia_nionspy.exe

  • Size

    280KB

  • MD5

    a83a2ee8d86adc09f099753ebe9e305a

  • SHA1

    6c2437962adbd7cc57d1cd5d927478b2ff481f6b

  • SHA256

    364637aa422c4944780ca5eac13235c0a2e0266d6617b1f6f1fcbd7989f08955

  • SHA512

    5fae43ab00fc49491c936d46a185c6c2f6f810e5dfe1d5c04497a9511d6ccf635466a58dcebb2cac2d1c047fce1c8ec967074f05e16d10b5b405b827e5defb1c

  • SSDEEP

    6144:nTz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDK:nTBPFV0RyWl3h2E+7pl

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-30_a83a2ee8d86adc09f099753ebe9e305a_mafia_nionspy.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-30_a83a2ee8d86adc09f099753ebe9e305a_mafia_nionspy.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\wlogon32.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\wlogon32.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\wlogon32.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5040
      • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\wlogon32.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\wlogon32.exe"
        3⤵
        • Executes dropped EXE
        PID:2664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\wlogon32.exe

    Filesize

    280KB

    MD5

    4fa7b0ac03103acb113bff42ec6d85b4

    SHA1

    4d6eaffdc1270b6daf5ba2ffcfd53b5804cc288c

    SHA256

    e2d3edb1173620b66b9c7d8976603684dd3008fb41739fbb6cbdd9b3890d4ae2

    SHA512

    e7cb5a6bc07fe844e25c568be284a85a35637daf262009761e2e65f877d8c84ba0bcc985fb9b7502fbc9a8ddcdfae015a81945df09efaed8d30de3eec312750f