Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/08/2024, 10:41

General

  • Target

    2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe

  • Size

    274KB

  • MD5

    0e47f02c5eb1a762e7aedd459f424ef6

  • SHA1

    4952a4e27c30e75fb45b40bf92566ec0bd1de3f1

  • SHA256

    952ae4ee3d533d8f0d53f32eb0ec51cefea50bf4562964b4caf712d424d3d067

  • SHA512

    980cd7a3aff9766b9a86e3b56c095acbd7d3d18cd28be86b0276fc6b5daf9790bb071aa5d0c27d802b840b144f53091bc4def3c0ca9235a249783312877a8cfb

  • SSDEEP

    6144:MYvZ6brUj+bvqHXSpWr2Kqz83Oad3Jg4PlPDIQ+KLzDDg:MYvEbrUjp3SpWggd3JBPlPDIQ3g

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-08-08_0e47f02c5eb1a762e7aedd459f424ef6_mafia_nionspy.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4964
    • C:\Users\Admin\AppData\Roaming\Microsoft\Posix\csrssys.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\csrssys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\csrssys.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4036
      • C:\Users\Admin\AppData\Roaming\Microsoft\Posix\csrssys.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\csrssys.exe"
        3⤵
        • Executes dropped EXE
        PID:4936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Posix\csrssys.exe

    Filesize

    274KB

    MD5

    4e8f972d734860ec84dde59a1c5c6a80

    SHA1

    c15fe82f2548f4260cb4a963cc3dd9a6ae89b330

    SHA256

    3b8a5b44dfa0914cbf3939b1a9911411f8998f8c923aa0489cc9c77d9058c35f

    SHA512

    37070c51a7108757c3b71f3c36cd66697398553b10f0101552bc33c393d012c9f5f0f0d0cb05a3574840ffff2f6aa86c29047e5661fed03b8698016a7dd42f57