Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    123s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    08/08/2024, 10:41

General

  • Target

    2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe

  • Size

    274KB

  • MD5

    0e47f02c5eb1a762e7aedd459f424ef6

  • SHA1

    4952a4e27c30e75fb45b40bf92566ec0bd1de3f1

  • SHA256

    952ae4ee3d533d8f0d53f32eb0ec51cefea50bf4562964b4caf712d424d3d067

  • SHA512

    980cd7a3aff9766b9a86e3b56c095acbd7d3d18cd28be86b0276fc6b5daf9790bb071aa5d0c27d802b840b144f53091bc4def3c0ca9235a249783312877a8cfb

  • SSDEEP

    6144:MYvZ6brUj+bvqHXSpWr2Kqz83Oad3Jg4PlPDIQ+KLzDDg:MYvEbrUjp3SpWggd3JBPlPDIQ3g

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2412
    • C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\lsassys.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\lsassys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\lsassys.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2276
      • C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\lsassys.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\lsassys.exe"
        3⤵
        • Executes dropped EXE
        PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\Microsoft\XMMC\lsassys.exe

    Filesize

    274KB

    MD5

    70eee9a2c55f7559bb5752423beb1333

    SHA1

    ae344257b76c819635956a9a2f5117b031df81a6

    SHA256

    4a3fbd6f716bb7c41042592748ec583e47df4d83771d13325ab9157eee3f3296

    SHA512

    fadc8d767192594a1aba16c1f28c1db384f1835ae7b68c36a634d7aae270c2b18202b75d93728606fd22c6abc0cb203eab51d89087b6dadad256b24e049f32cd