Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/08/2024, 10:41
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe
-
Size
274KB
-
MD5
0e47f02c5eb1a762e7aedd459f424ef6
-
SHA1
4952a4e27c30e75fb45b40bf92566ec0bd1de3f1
-
SHA256
952ae4ee3d533d8f0d53f32eb0ec51cefea50bf4562964b4caf712d424d3d067
-
SHA512
980cd7a3aff9766b9a86e3b56c095acbd7d3d18cd28be86b0276fc6b5daf9790bb071aa5d0c27d802b840b144f53091bc4def3c0ca9235a249783312877a8cfb
-
SSDEEP
6144:MYvZ6brUj+bvqHXSpWr2Kqz83Oad3Jg4PlPDIQ+KLzDDg:MYvEbrUjp3SpWggd3JBPlPDIQ3g
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe -
Executes dropped EXE 2 IoCs
pid Process 4036 csrssys.exe 4936 csrssys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrssys.exe -
Modifies registry class 30 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\.exe\shell 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\wexplorer 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\wexplorer\DefaultIcon 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\wexplorer\shell 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\wexplorer\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\wexplorer\shell\runas 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\wexplorer\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\wexplorer\Content-Type = "application/x-msdownload" 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\wexplorer\shell\open\command 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Posix\\csrssys.exe\" /START \"%1\" %*" 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\wexplorer\DefaultIcon\ = "%1" 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\.exe\DefaultIcon 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\wexplorer\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Posix\\csrssys.exe\" /START \"%1\" %*" 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\wexplorer\shell\runas\command\ = "\"%1\" %*" 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\.exe\DefaultIcon\ = "%1" 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\.exe\shell\runas\command 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\.exe\shell\runas 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\wexplorer\ = "Application" 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\wexplorer\shell\runas\command 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\.exe\shell\open 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\wexplorer\shell\open 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\.exe 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\.exe\ = "wexplorer" 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\.exe\Content-Type = "application/x-msdownload" 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\.exe\shell\open\command 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4036 csrssys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4964 wrote to memory of 4036 4964 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe 86 PID 4964 wrote to memory of 4036 4964 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe 86 PID 4964 wrote to memory of 4036 4964 2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe 86 PID 4036 wrote to memory of 4936 4036 csrssys.exe 87 PID 4036 wrote to memory of 4936 4036 csrssys.exe 87 PID 4036 wrote to memory of 4936 4036 csrssys.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Roaming\Microsoft\Posix\csrssys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Posix\csrssys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\csrssys.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Users\Admin\AppData\Roaming\Microsoft\Posix\csrssys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Posix\csrssys.exe"3⤵
- Executes dropped EXE
PID:4936
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274KB
MD54e8f972d734860ec84dde59a1c5c6a80
SHA1c15fe82f2548f4260cb4a963cc3dd9a6ae89b330
SHA2563b8a5b44dfa0914cbf3939b1a9911411f8998f8c923aa0489cc9c77d9058c35f
SHA51237070c51a7108757c3b71f3c36cd66697398553b10f0101552bc33c393d012c9f5f0f0d0cb05a3574840ffff2f6aa86c29047e5661fed03b8698016a7dd42f57