Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
123s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 12:51
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe
-
Size
280KB
-
MD5
5f65453767848eb5978ba1e6d1528e8a
-
SHA1
a2b7355356d8a693256f0cd99a18a262fe449c95
-
SHA256
cea8d1ebadf8352bb5f6fef97267cced01a7208b2eaf2d9f7f37705cc759b64b
-
SHA512
98a4a62ff3562b72933df0166a6056c4272d7b0b91d8b6f0f978ded36e2de9edbdb34eca326f3007d80fa00fd5511fc4ff2c347a7e3808498d955a7303ef1c19
-
SSDEEP
6144:5Tz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDK:5TBPFV0RyWl3h2E+7pl
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2016 wlogon32.exe 2268 wlogon32.exe -
Loads dropped DLL 4 IoCs
pid Process 2512 2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe 2512 2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe 2512 2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe 2016 wlogon32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlogon32.exe -
Modifies registry class 28 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.exe 2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.exe\Content-Type = "application/x-msdownload" 2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.exe\shell\runas\command 2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\haldriver\ = "Application" 2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\haldriver\Content-Type = "application/x-msdownload" 2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\haldriver\DefaultIcon 2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\haldriver\DefaultIcon\ = "%1" 2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\haldriver\shell\open\command 2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.exe\DefaultIcon 2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.exe\shell\open 2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_x86_64\\wlogon32.exe\" /START \"%1\" %*" 2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\haldriver 2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\haldriver\shell\runas\command 2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.exe\shell\open\command 2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\haldriver\shell\runas 2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.exe\shell 2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\haldriver\shell\open 2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\haldriver\shell\runas\command\ = "\"%1\" %*" 2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.exe\DefaultIcon\ = "%1" 2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" 2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\haldriver\shell 2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\haldriver\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.exe\ = "haldriver" 2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.exe\shell\runas 2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\haldriver\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_x86_64\\wlogon32.exe\" /START \"%1\" %*" 2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\haldriver\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2016 wlogon32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2016 2512 2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe 31 PID 2512 wrote to memory of 2016 2512 2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe 31 PID 2512 wrote to memory of 2016 2512 2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe 31 PID 2512 wrote to memory of 2016 2512 2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe 31 PID 2016 wrote to memory of 2268 2016 wlogon32.exe 32 PID 2016 wrote to memory of 2268 2016 wlogon32.exe 32 PID 2016 wrote to memory of 2268 2016 wlogon32.exe 32 PID 2016 wrote to memory of 2268 2016 wlogon32.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-11_5f65453767848eb5978ba1e6d1528e8a_mafia_nionspy.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\wlogon32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\wlogon32.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\wlogon32.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\wlogon32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\wlogon32.exe"3⤵
- Executes dropped EXE
PID:2268
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD5994cb3ea1142e33e843161a2f24ac9ba
SHA1875a4674c93e55783791b34f053c6b8ea6fe1d6f
SHA256ec4d5554ba5ea921e3f4cd2374ceb129585d8e8378ae2309e390de3f8b8c8397
SHA5124f71ae29a7a06f8ce605ce7a9978076cfe00dcfb9f530950943dd981d6bde7c285bd7265d45d6e5b66d5d3b9717ee80a1914c271b9342cd32e38094b423d93aa