Analysis

  • max time kernel
    134s
  • max time network
    82s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 18:39

General

  • Target

    2022-11-23_b51fc371ec27f293bccdb3db89a27e56_mafia_nionspy.exe

  • Size

    344KB

  • MD5

    b51fc371ec27f293bccdb3db89a27e56

  • SHA1

    8912c0e45d16b9a5b1550bda8a56c8ab88ba6adf

  • SHA256

    2214ef5bf65914b217c331c5cce83c54d45c0a67892c6403acbe6534c468f35b

  • SHA512

    dc3bfdcd557e129f0e5e149007c43bf85528ee7d708c896447a4a2e0f4395df2d79429535660ce57e5adc8fb9c9af54f62fefc08028afde72bbc42e5b7777e5d

  • SSDEEP

    6144:RTz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDBRm1+gmN:RTBPFV0RyWl3h2E+7pYm0

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2022-11-23_b51fc371ec27f293bccdb3db89a27e56_mafia_nionspy.exe
    "C:\Users\Admin\AppData\Local\Temp\2022-11-23_b51fc371ec27f293bccdb3db89a27e56_mafia_nionspy.exe"
    1⤵
    • Loads dropped DLL
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:288
    • C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:880
      • C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe"
        3⤵
        • Executes dropped EXE
        PID:1784

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe

    Filesize

    344KB

    MD5

    b71d20105bab8e7246723d41f9923ee5

    SHA1

    6e31fbf811d20481043d2b9721479aa0190bd4fa

    SHA256

    968929a98580f3f2b7f369214cfb090a0d901fff58ae5a925b54f057ad196102

    SHA512

    6eed74f27adf9d85a78a5c82cff9dd094a96486ecf6e0b1f42e5d0bbd31351488da6f647d6ef4ecd0a7780830452dc2b1ca943df235236f0926d5d27f2441f36

  • C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe

    Filesize

    344KB

    MD5

    b71d20105bab8e7246723d41f9923ee5

    SHA1

    6e31fbf811d20481043d2b9721479aa0190bd4fa

    SHA256

    968929a98580f3f2b7f369214cfb090a0d901fff58ae5a925b54f057ad196102

    SHA512

    6eed74f27adf9d85a78a5c82cff9dd094a96486ecf6e0b1f42e5d0bbd31351488da6f647d6ef4ecd0a7780830452dc2b1ca943df235236f0926d5d27f2441f36

  • C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe

    Filesize

    344KB

    MD5

    b71d20105bab8e7246723d41f9923ee5

    SHA1

    6e31fbf811d20481043d2b9721479aa0190bd4fa

    SHA256

    968929a98580f3f2b7f369214cfb090a0d901fff58ae5a925b54f057ad196102

    SHA512

    6eed74f27adf9d85a78a5c82cff9dd094a96486ecf6e0b1f42e5d0bbd31351488da6f647d6ef4ecd0a7780830452dc2b1ca943df235236f0926d5d27f2441f36

  • \Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe

    Filesize

    344KB

    MD5

    b71d20105bab8e7246723d41f9923ee5

    SHA1

    6e31fbf811d20481043d2b9721479aa0190bd4fa

    SHA256

    968929a98580f3f2b7f369214cfb090a0d901fff58ae5a925b54f057ad196102

    SHA512

    6eed74f27adf9d85a78a5c82cff9dd094a96486ecf6e0b1f42e5d0bbd31351488da6f647d6ef4ecd0a7780830452dc2b1ca943df235236f0926d5d27f2441f36

  • \Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe

    Filesize

    344KB

    MD5

    b71d20105bab8e7246723d41f9923ee5

    SHA1

    6e31fbf811d20481043d2b9721479aa0190bd4fa

    SHA256

    968929a98580f3f2b7f369214cfb090a0d901fff58ae5a925b54f057ad196102

    SHA512

    6eed74f27adf9d85a78a5c82cff9dd094a96486ecf6e0b1f42e5d0bbd31351488da6f647d6ef4ecd0a7780830452dc2b1ca943df235236f0926d5d27f2441f36

  • \Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe

    Filesize

    344KB

    MD5

    b71d20105bab8e7246723d41f9923ee5

    SHA1

    6e31fbf811d20481043d2b9721479aa0190bd4fa

    SHA256

    968929a98580f3f2b7f369214cfb090a0d901fff58ae5a925b54f057ad196102

    SHA512

    6eed74f27adf9d85a78a5c82cff9dd094a96486ecf6e0b1f42e5d0bbd31351488da6f647d6ef4ecd0a7780830452dc2b1ca943df235236f0926d5d27f2441f36

  • memory/288-54-0x0000000075B11000-0x0000000075B13000-memory.dmp

    Filesize

    8KB

  • memory/880-58-0x0000000000000000-mapping.dmp

  • memory/1784-62-0x0000000000000000-mapping.dmp