Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/09/2024, 15:22

General

  • Target

    2024-09-08_15018b1c15ba6f1f349d9bb6c01fec12_mafia_nionspy.exe

  • Size

    280KB

  • MD5

    15018b1c15ba6f1f349d9bb6c01fec12

  • SHA1

    614246002d03ca9f1f0ff83ba8e5d1cefbbcbb61

  • SHA256

    9bed83ad4d4e9e99524e6f1ffe65b4a974ebc255920e7f8ee8e808fc98b5cb2b

  • SHA512

    19c42d159a6b3c0b163a5c9c54652c41cf5ef66d95e6a38e9ff4ca605cea76bfebf7325e71bab8742d8c0d6fb67452fb96754870d6a6f89655e09b49259724ec

  • SSDEEP

    6144:nQ+Tyfx4NF67Sbq2nW82X45gc3BaLZVS0mOoC8zbzDie:nQMyfmNFHfnWfhLZVHmOog

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-08_15018b1c15ba6f1f349d9bb6c01fec12_mafia_nionspy.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-08_15018b1c15ba6f1f349d9bb6c01fec12_mafia_nionspy.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4824
    • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\lsassys.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\lsassys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\lsassys.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2356
      • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\lsassys.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\lsassys.exe"
        3⤵
        • Executes dropped EXE
        PID:3832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\lsassys.exe

    Filesize

    280KB

    MD5

    958b0bd2487404e28b5c6d2d357596ec

    SHA1

    d115329146c56bfc20687a064da641443e8e4ce4

    SHA256

    c1abcb3a69ed64d4e32f9e49ed18985cbd59ba78c907e9eca305cf660fd66029

    SHA512

    79204609cb88fa7e13675000b3746962a67327be7fc835b7ea109050403dcc42642e1ec4a5d61af0bfafd03a29f343595a556a65e873ad2babf1da31abe21a95