Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    123s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 15:22

General

  • Target

    2024-09-08_15018b1c15ba6f1f349d9bb6c01fec12_mafia_nionspy.exe

  • Size

    280KB

  • MD5

    15018b1c15ba6f1f349d9bb6c01fec12

  • SHA1

    614246002d03ca9f1f0ff83ba8e5d1cefbbcbb61

  • SHA256

    9bed83ad4d4e9e99524e6f1ffe65b4a974ebc255920e7f8ee8e808fc98b5cb2b

  • SHA512

    19c42d159a6b3c0b163a5c9c54652c41cf5ef66d95e6a38e9ff4ca605cea76bfebf7325e71bab8742d8c0d6fb67452fb96754870d6a6f89655e09b49259724ec

  • SSDEEP

    6144:nQ+Tyfx4NF67Sbq2nW82X45gc3BaLZVS0mOoC8zbzDie:nQMyfmNFHfnWfhLZVHmOog

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-08_15018b1c15ba6f1f349d9bb6c01fec12_mafia_nionspy.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-08_15018b1c15ba6f1f349d9bb6c01fec12_mafia_nionspy.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1304
    • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\wlogon32.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\wlogon32.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\wlogon32.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1260
      • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\wlogon32.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\wlogon32.exe"
        3⤵
        • Executes dropped EXE
        PID:2340

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\wlogon32.exe

    Filesize

    280KB

    MD5

    3ab30412cf7aa965714992cbd8c138e6

    SHA1

    8581d1f209ec9fc2c967c5349137db2ef7c74a90

    SHA256

    fa0b0a78683b7a4c1b91eff40a84a9c0f46ddfa2accd15ecd80cab59b79d7b95

    SHA512

    ee119f111ee05c948912736eb2420e86267057401beaa0c5d8ffe1fb6196112a6f54c82de6c16da9cb32e5a19aa9de5707b18203b5dbc3dbd7d0f17ce58660bd