Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 09:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-20_c7b30626a6658c8694990daaa35fc6c4_mafia_nionspy.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-08-20_c7b30626a6658c8694990daaa35fc6c4_mafia_nionspy.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-20_c7b30626a6658c8694990daaa35fc6c4_mafia_nionspy.exe
-
Size
274KB
-
MD5
c7b30626a6658c8694990daaa35fc6c4
-
SHA1
5e27fb1a658b802c17aa60d2a78f6d18b51098bf
-
SHA256
cdab40e5668d72dd1765a4c68781931560217ab30acb8bc55f0f83101dfc56cd
-
SHA512
ed10f6fe269f105a229f9e6911e6ef8adc7cb6f5f8b2bd5e4d35b76d8afcbda69263b88736c4b2ec1419af8fc6120509fab036836151da9f761699898ba02da2
-
SSDEEP
6144:HXYvZ6brUj+bvqHXSpWr2Kqz83Oad3Jg4PlPDIQ+KLzDDg:3YvEbrUjp3SpWggd3JBPlPDIQ3g
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation 2024-08-20_c7b30626a6658c8694990daaa35fc6c4_mafia_nionspy.exe -
Executes dropped EXE 2 IoCs
pid Process 1588 sidebar2.exe 3892 sidebar2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-20_c7b30626a6658c8694990daaa35fc6c4_mafia_nionspy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sidebar2.exe -
Modifies registry class 30 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\prochost\DefaultIcon 2024-08-20_c7b30626a6658c8694990daaa35fc6c4_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\prochost\ = "Application" 2024-08-20_c7b30626a6658c8694990daaa35fc6c4_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\prochost\Content-Type = "application/x-msdownload" 2024-08-20_c7b30626a6658c8694990daaa35fc6c4_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\prochost\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-08-20_c7b30626a6658c8694990daaa35fc6c4_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\.exe\shell 2024-08-20_c7b30626a6658c8694990daaa35fc6c4_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\prochost\shell\open\command 2024-08-20_c7b30626a6658c8694990daaa35fc6c4_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\prochost\shell\open 2024-08-20_c7b30626a6658c8694990daaa35fc6c4_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\.exe\DefaultIcon\ = "%1" 2024-08-20_c7b30626a6658c8694990daaa35fc6c4_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_x86_64\\sidebar2.exe\" /START \"%1\" %*" 2024-08-20_c7b30626a6658c8694990daaa35fc6c4_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\prochost\shell\runas\command 2024-08-20_c7b30626a6658c8694990daaa35fc6c4_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\prochost\shell\runas 2024-08-20_c7b30626a6658c8694990daaa35fc6c4_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\.exe\shell\open\command 2024-08-20_c7b30626a6658c8694990daaa35fc6c4_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\.exe\shell\open 2024-08-20_c7b30626a6658c8694990daaa35fc6c4_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\prochost 2024-08-20_c7b30626a6658c8694990daaa35fc6c4_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\prochost\shell 2024-08-20_c7b30626a6658c8694990daaa35fc6c4_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\.exe\Content-Type = "application/x-msdownload" 2024-08-20_c7b30626a6658c8694990daaa35fc6c4_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-08-20_c7b30626a6658c8694990daaa35fc6c4_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\prochost\shell\runas\command\ = "\"%1\" %*" 2024-08-20_c7b30626a6658c8694990daaa35fc6c4_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\.exe 2024-08-20_c7b30626a6658c8694990daaa35fc6c4_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings 2024-08-20_c7b30626a6658c8694990daaa35fc6c4_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-08-20_c7b30626a6658c8694990daaa35fc6c4_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\.exe\shell\runas 2024-08-20_c7b30626a6658c8694990daaa35fc6c4_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 2024-08-20_c7b30626a6658c8694990daaa35fc6c4_mafia_nionspy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2024-08-20_c7b30626a6658c8694990daaa35fc6c4_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\prochost\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-08-20_c7b30626a6658c8694990daaa35fc6c4_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\.exe\ = "prochost" 2024-08-20_c7b30626a6658c8694990daaa35fc6c4_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\.exe\DefaultIcon 2024-08-20_c7b30626a6658c8694990daaa35fc6c4_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\.exe\shell\runas\command 2024-08-20_c7b30626a6658c8694990daaa35fc6c4_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\prochost\DefaultIcon\ = "%1" 2024-08-20_c7b30626a6658c8694990daaa35fc6c4_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\prochost\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_x86_64\\sidebar2.exe\" /START \"%1\" %*" 2024-08-20_c7b30626a6658c8694990daaa35fc6c4_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1588 sidebar2.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4360 wrote to memory of 1588 4360 2024-08-20_c7b30626a6658c8694990daaa35fc6c4_mafia_nionspy.exe 87 PID 4360 wrote to memory of 1588 4360 2024-08-20_c7b30626a6658c8694990daaa35fc6c4_mafia_nionspy.exe 87 PID 4360 wrote to memory of 1588 4360 2024-08-20_c7b30626a6658c8694990daaa35fc6c4_mafia_nionspy.exe 87 PID 1588 wrote to memory of 3892 1588 sidebar2.exe 88 PID 1588 wrote to memory of 3892 1588 sidebar2.exe 88 PID 1588 wrote to memory of 3892 1588 sidebar2.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-20_c7b30626a6658c8694990daaa35fc6c4_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-20_c7b30626a6658c8694990daaa35fc6c4_mafia_nionspy.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\sidebar2.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\sidebar2.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\sidebar2.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\sidebar2.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\sidebar2.exe"3⤵
- Executes dropped EXE
PID:3892
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274KB
MD507e14521072312298a16963eedefd4ca
SHA19e24055c87a5204d4f1ffd2288081a3b5adb80e1
SHA256c569888aea5cfae89aeb9c0187d829b46dbf08010eaea6f8f025cc2aab851bc3
SHA51237a13f2c7272ce4d6a06a6b50770fe285733ca0a5ca78d767119d68de69f30908bc61a7f52a5d54136391cfcbb0151a71d44c5333d058194e3299b11b92c63a9