Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
123s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08/08/2024, 10:41
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe
-
Size
274KB
-
MD5
0e47f02c5eb1a762e7aedd459f424ef6
-
SHA1
4952a4e27c30e75fb45b40bf92566ec0bd1de3f1
-
SHA256
952ae4ee3d533d8f0d53f32eb0ec51cefea50bf4562964b4caf712d424d3d067
-
SHA512
980cd7a3aff9766b9a86e3b56c095acbd7d3d18cd28be86b0276fc6b5daf9790bb071aa5d0c27d802b840b144f53091bc4def3c0ca9235a249783312877a8cfb
-
SSDEEP
6144:MYvZ6brUj+bvqHXSpWr2Kqz83Oad3Jg4PlPDIQ+KLzDDg:MYvEbrUjp3SpWggd3JBPlPDIQ3g
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2276 lsassys.exe 2688 lsassys.exe -
Loads dropped DLL 4 IoCs
pid Process 2412 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe 2412 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe 2412 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe 2276 lsassys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsassys.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe -
Modifies registry class 28 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\halnt\shell\runas 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\.exe\shell\open\command 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\halnt\DefaultIcon 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\halnt\shell 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\halnt\shell\open 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\halnt\shell\runas\command\ = "\"%1\" %*" 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\halnt\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\halnt\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\XMMC\\lsassys.exe\" /START \"%1\" %*" 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\.exe\ = "halnt" 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\.exe\shell 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\.exe\shell\runas\command 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\.exe 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\.exe\Content-Type = "application/x-msdownload" 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\.exe\shell\open 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\.exe\shell\runas 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\.exe\DefaultIcon\ = "%1" 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\XMMC\\lsassys.exe\" /START \"%1\" %*" 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\halnt\shell\open\command 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\halnt\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\halnt\shell\runas\command 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\halnt\DefaultIcon\ = "%1" 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\halnt 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\halnt\ = "Application" 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\halnt\Content-Type = "application/x-msdownload" 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\.exe\DefaultIcon 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2276 lsassys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2276 2412 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe 30 PID 2412 wrote to memory of 2276 2412 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe 30 PID 2412 wrote to memory of 2276 2412 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe 30 PID 2412 wrote to memory of 2276 2412 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe 30 PID 2276 wrote to memory of 2688 2276 lsassys.exe 31 PID 2276 wrote to memory of 2688 2276 lsassys.exe 31 PID 2276 wrote to memory of 2688 2276 lsassys.exe 31 PID 2276 wrote to memory of 2688 2276 lsassys.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\lsassys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\lsassys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\lsassys.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\lsassys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\lsassys.exe"3⤵
- Executes dropped EXE
PID:2688
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274KB
MD570eee9a2c55f7559bb5752423beb1333
SHA1ae344257b76c819635956a9a2f5117b031df81a6
SHA2564a3fbd6f716bb7c41042592748ec583e47df4d83771d13325ab9157eee3f3296
SHA512fadc8d767192594a1aba16c1f28c1db384f1835ae7b68c36a634d7aae270c2b18202b75d93728606fd22c6abc0cb203eab51d89087b6dadad256b24e049f32cd