Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 11:50
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-03_f11c6729722325a99a857b4c49d18ca6_mafia_nionspy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-03_f11c6729722325a99a857b4c49d18ca6_mafia_nionspy.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-03_f11c6729722325a99a857b4c49d18ca6_mafia_nionspy.exe
-
Size
279KB
-
MD5
f11c6729722325a99a857b4c49d18ca6
-
SHA1
c4d0e9fa3d75df8bbf5634a496a788124a2df039
-
SHA256
3e5325d28cfc4b74494739c7caa21d3a1187520e8cb79666c3b06e0564d16bf8
-
SHA512
3017cdaf14a64e55d980f2ffc274e3627a76ea709e5e12b5ad1fc397f22a1f386ab3ae712b1b5ad98a02737f816b12e8fe7caa0ec79b5f1cf440c6d948e24f25
-
SSDEEP
6144:9Tz+WrPFZvTXb4RyW42vFlOloh2E+7phg7ozD:9TBPFV0RyWl3h2E+7ph
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 2024-06-03_f11c6729722325a99a857b4c49d18ca6_mafia_nionspy.exe -
Executes dropped EXE 2 IoCs
pid Process 1316 dwmsys.exe 1416 dwmsys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\.exe\Content-Type = "application/x-msdownload" 2024-06-03_f11c6729722325a99a857b4c49d18ca6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\.exe\ = "systemui" 2024-06-03_f11c6729722325a99a857b4c49d18ca6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\.exe\shell\open 2024-06-03_f11c6729722325a99a857b4c49d18ca6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\.exe 2024-06-03_f11c6729722325a99a857b4c49d18ca6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\.exe\DefaultIcon 2024-06-03_f11c6729722325a99a857b4c49d18ca6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\.exe\shell\runas 2024-06-03_f11c6729722325a99a857b4c49d18ca6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings 2024-06-03_f11c6729722325a99a857b4c49d18ca6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\systemui\shell 2024-06-03_f11c6729722325a99a857b4c49d18ca6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\systemui\Content-Type = "application/x-msdownload" 2024-06-03_f11c6729722325a99a857b4c49d18ca6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\systemui\DefaultIcon\ = "%1" 2024-06-03_f11c6729722325a99a857b4c49d18ca6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\systemui\shell\runas\command 2024-06-03_f11c6729722325a99a857b4c49d18ca6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Sys32\\dwmsys.exe\" /START \"%1\" %*" 2024-06-03_f11c6729722325a99a857b4c49d18ca6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\systemui 2024-06-03_f11c6729722325a99a857b4c49d18ca6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\.exe\DefaultIcon\ = "%1" 2024-06-03_f11c6729722325a99a857b4c49d18ca6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-06-03_f11c6729722325a99a857b4c49d18ca6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-06-03_f11c6729722325a99a857b4c49d18ca6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\systemui\shell\open\command 2024-06-03_f11c6729722325a99a857b4c49d18ca6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\systemui\shell\open 2024-06-03_f11c6729722325a99a857b4c49d18ca6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\systemui\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-06-03_f11c6729722325a99a857b4c49d18ca6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\systemui\shell\runas\command\ = "\"%1\" %*" 2024-06-03_f11c6729722325a99a857b4c49d18ca6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\.exe\shell\open\command 2024-06-03_f11c6729722325a99a857b4c49d18ca6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\.exe\shell 2024-06-03_f11c6729722325a99a857b4c49d18ca6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\.exe\shell\runas\command 2024-06-03_f11c6729722325a99a857b4c49d18ca6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\systemui\DefaultIcon 2024-06-03_f11c6729722325a99a857b4c49d18ca6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\systemui\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Sys32\\dwmsys.exe\" /START \"%1\" %*" 2024-06-03_f11c6729722325a99a857b4c49d18ca6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\systemui\shell\runas 2024-06-03_f11c6729722325a99a857b4c49d18ca6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\systemui\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-06-03_f11c6729722325a99a857b4c49d18ca6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 2024-06-03_f11c6729722325a99a857b4c49d18ca6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\systemui\ = "Application" 2024-06-03_f11c6729722325a99a857b4c49d18ca6_mafia_nionspy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2024-06-03_f11c6729722325a99a857b4c49d18ca6_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1316 dwmsys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4036 wrote to memory of 1316 4036 2024-06-03_f11c6729722325a99a857b4c49d18ca6_mafia_nionspy.exe 83 PID 4036 wrote to memory of 1316 4036 2024-06-03_f11c6729722325a99a857b4c49d18ca6_mafia_nionspy.exe 83 PID 4036 wrote to memory of 1316 4036 2024-06-03_f11c6729722325a99a857b4c49d18ca6_mafia_nionspy.exe 83 PID 1316 wrote to memory of 1416 1316 dwmsys.exe 84 PID 1316 wrote to memory of 1416 1316 dwmsys.exe 84 PID 1316 wrote to memory of 1416 1316 dwmsys.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-03_f11c6729722325a99a857b4c49d18ca6_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-03_f11c6729722325a99a857b4c49d18ca6_mafia_nionspy.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\dwmsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\dwmsys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\dwmsys.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\dwmsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\dwmsys.exe"3⤵
- Executes dropped EXE
PID:1416
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
279KB
MD5e724a6d422dadb41503ca9046c45854a
SHA146acda282f7e204631dae5fa483fa90a92421e55
SHA256991e54994d8d3d51615534d26fa958c2e55f7bdfe26531ec7d8cf7c8be8c2eaf
SHA5129408cdce138c9e32b6f1341278532f709faceb0ec336339747774f8f25c93300b63994380915f892993789dc5146d56198298a0af2edb31d882f5d53d067ca69