Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/07/2024, 05:04

General

  • Target

    2024-07-11_7f52749368b7f699c124563d3e19e952_mafia_nionspy.exe

  • Size

    280KB

  • MD5

    7f52749368b7f699c124563d3e19e952

  • SHA1

    0ceee30a8e68ac586cb3e5ba2465066456291c77

  • SHA256

    52459b04eebb4c04998beb625d917fa85059866285639374f2de18b0e8a8f0ba

  • SHA512

    a15dea8aba6531c4948f952a74252e219b34e9bb32f69f771644fd7f3274529ba3706414bdda6a6c6da5cd0c2ab736ccbc8fdc6574a09edad1366d9f185e689e

  • SSDEEP

    6144:wTz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDK:wTBPFV0RyWl3h2E+7pl

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-07-11_7f52749368b7f699c124563d3e19e952_mafia_nionspy.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-07-11_7f52749368b7f699c124563d3e19e952_mafia_nionspy.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4316
    • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\dwmsys.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\dwmsys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\dwmsys.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2240
      • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\dwmsys.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\dwmsys.exe"
        3⤵
        • Executes dropped EXE
        PID:2360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\dwmsys.exe

    Filesize

    280KB

    MD5

    cf2b7cc3134c8e722c29ec66781664c0

    SHA1

    afe27994d8ebee61f6ae07476825933e32e12999

    SHA256

    4b72f553a93f1f8352d73f5bdb12ed5fd5721eff0d17eda633910240c190ac52

    SHA512

    6fc2ee740e1b4ac1d6338096f18d055be18bb9782fd4148a77074509a0230838944a4bfd1b466aff8952b53d0c42db17ac3f51f67b567cbadbaca9519091c9cb