Analysis

  • max time kernel
    297s
  • max time network
    329s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 18:39

General

  • Target

    2022-11-23_d59a7a275f0aa9101c6f92ad44da6192_mafia_nionspy.exe

  • Size

    344KB

  • MD5

    d59a7a275f0aa9101c6f92ad44da6192

  • SHA1

    81da6f5e9e096b427f01726df5865f98cdc7479d

  • SHA256

    69bdeb53d52c6361d9c868df9d27c9ba20b92cef6d8e923718b473acb372f6c1

  • SHA512

    6c7cf23265ff00d9668c3ae298d17f15876e6c0c3caccf3b347b0b4306d29c170935eea7d58d2f004186fd08d64bc22c3df0398b736708789d7e88b42c2c6e44

  • SSDEEP

    6144:qTz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDBRm1+gmN:qTBPFV0RyWl3h2E+7pYm0

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2022-11-23_d59a7a275f0aa9101c6f92ad44da6192_mafia_nionspy.exe
    "C:\Users\Admin\AppData\Local\Temp\2022-11-23_d59a7a275f0aa9101c6f92ad44da6192_mafia_nionspy.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:868
    • C:\Users\Admin\AppData\Roaming\Microsoft\Posix\lsassys.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\lsassys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\lsassys.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3704
      • C:\Users\Admin\AppData\Roaming\Microsoft\Posix\lsassys.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\lsassys.exe"
        3⤵
        • Executes dropped EXE
        PID:980

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Posix\lsassys.exe

    Filesize

    344KB

    MD5

    9c3b595e74fb8ab528b8f5c463b2ea6b

    SHA1

    07a27c100f6e419444c8afde626146e57d4d3ffe

    SHA256

    d095328fc56cf3933e41edf2e9ad25fa4e67ee132f874f6a4da8dc15d96e91ae

    SHA512

    f7fa59eedb8130bd372dac6a8d56ad0a5edbd83dc5585320f69313a828c16fa6c5e0aa2bf8fba21bdf6d96dfa77dce75edec5b4fc47b2a04ab894ec903b31fe5

  • C:\Users\Admin\AppData\Roaming\Microsoft\Posix\lsassys.exe

    Filesize

    344KB

    MD5

    9c3b595e74fb8ab528b8f5c463b2ea6b

    SHA1

    07a27c100f6e419444c8afde626146e57d4d3ffe

    SHA256

    d095328fc56cf3933e41edf2e9ad25fa4e67ee132f874f6a4da8dc15d96e91ae

    SHA512

    f7fa59eedb8130bd372dac6a8d56ad0a5edbd83dc5585320f69313a828c16fa6c5e0aa2bf8fba21bdf6d96dfa77dce75edec5b4fc47b2a04ab894ec903b31fe5

  • C:\Users\Admin\AppData\Roaming\Microsoft\Posix\lsassys.exe

    Filesize

    344KB

    MD5

    9c3b595e74fb8ab528b8f5c463b2ea6b

    SHA1

    07a27c100f6e419444c8afde626146e57d4d3ffe

    SHA256

    d095328fc56cf3933e41edf2e9ad25fa4e67ee132f874f6a4da8dc15d96e91ae

    SHA512

    f7fa59eedb8130bd372dac6a8d56ad0a5edbd83dc5585320f69313a828c16fa6c5e0aa2bf8fba21bdf6d96dfa77dce75edec5b4fc47b2a04ab894ec903b31fe5

  • memory/980-135-0x0000000000000000-mapping.dmp

  • memory/3704-132-0x0000000000000000-mapping.dmp