Analysis

  • max time kernel
    123s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    01/08/2023, 15:38

General

  • Target

    2c4464cdd5a7cf6be11cf396d6e87909_mafia_nionspy_JC.exe

  • Size

    280KB

  • MD5

    2c4464cdd5a7cf6be11cf396d6e87909

  • SHA1

    be3e63b6b8f14dc849e7f4a0cc1fcbb53f8554d9

  • SHA256

    8b6bfc846cfed814cc4c8f5e6e0626a239f3e83dabd5618cd8795276f9d2c6a2

  • SHA512

    7cfb2621be5d5df9dd21f4b38f12ae26e7bc86a0c18f61132cfd49d1828f58be0f762f58b79face8c8017790208a09d3ba3ad529193ead9c412c9827bf151eca

  • SSDEEP

    6144:IQ+Tyfx4NF67Sbq2nW82X45gc3BaLZVS0mOoC8zbzDie:IQMyfmNFHfnWfhLZVHmOog

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c4464cdd5a7cf6be11cf396d6e87909_mafia_nionspy_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\2c4464cdd5a7cf6be11cf396d6e87909_mafia_nionspy_JC.exe"
    1⤵
    • Loads dropped DLL
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2340
    • C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\SearchIndexerDB.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\SearchIndexerDB.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\SearchIndexerDB.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1252
      • C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\SearchIndexerDB.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\SearchIndexerDB.exe"
        3⤵
        • Executes dropped EXE
        PID:2812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\SearchIndexerDB.exe

    Filesize

    280KB

    MD5

    263693c99fe7284f6277b6ac9faa6019

    SHA1

    c540353c431d11d29a051a1bf4a893862f89f329

    SHA256

    d9847a9bc30a4eb9bd66dce767349f61b2428c3372400a9289a551fe4257b49a

    SHA512

    16e4f3f35b6d659080f3d983eb95d601ff4b8faaaa3daa09bee149747895df9559aa94b4b1b4af5232a1e05ff8d2a2c034074d3f8029d3a3cea26791c9d48dfc

  • C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\SearchIndexerDB.exe

    Filesize

    280KB

    MD5

    263693c99fe7284f6277b6ac9faa6019

    SHA1

    c540353c431d11d29a051a1bf4a893862f89f329

    SHA256

    d9847a9bc30a4eb9bd66dce767349f61b2428c3372400a9289a551fe4257b49a

    SHA512

    16e4f3f35b6d659080f3d983eb95d601ff4b8faaaa3daa09bee149747895df9559aa94b4b1b4af5232a1e05ff8d2a2c034074d3f8029d3a3cea26791c9d48dfc

  • C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\SearchIndexerDB.exe

    Filesize

    280KB

    MD5

    263693c99fe7284f6277b6ac9faa6019

    SHA1

    c540353c431d11d29a051a1bf4a893862f89f329

    SHA256

    d9847a9bc30a4eb9bd66dce767349f61b2428c3372400a9289a551fe4257b49a

    SHA512

    16e4f3f35b6d659080f3d983eb95d601ff4b8faaaa3daa09bee149747895df9559aa94b4b1b4af5232a1e05ff8d2a2c034074d3f8029d3a3cea26791c9d48dfc

  • C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\SearchIndexerDB.exe

    Filesize

    280KB

    MD5

    263693c99fe7284f6277b6ac9faa6019

    SHA1

    c540353c431d11d29a051a1bf4a893862f89f329

    SHA256

    d9847a9bc30a4eb9bd66dce767349f61b2428c3372400a9289a551fe4257b49a

    SHA512

    16e4f3f35b6d659080f3d983eb95d601ff4b8faaaa3daa09bee149747895df9559aa94b4b1b4af5232a1e05ff8d2a2c034074d3f8029d3a3cea26791c9d48dfc

  • \Users\Admin\AppData\Roaming\Microsoft\XMMC\SearchIndexerDB.exe

    Filesize

    280KB

    MD5

    263693c99fe7284f6277b6ac9faa6019

    SHA1

    c540353c431d11d29a051a1bf4a893862f89f329

    SHA256

    d9847a9bc30a4eb9bd66dce767349f61b2428c3372400a9289a551fe4257b49a

    SHA512

    16e4f3f35b6d659080f3d983eb95d601ff4b8faaaa3daa09bee149747895df9559aa94b4b1b4af5232a1e05ff8d2a2c034074d3f8029d3a3cea26791c9d48dfc

  • \Users\Admin\AppData\Roaming\Microsoft\XMMC\SearchIndexerDB.exe

    Filesize

    280KB

    MD5

    263693c99fe7284f6277b6ac9faa6019

    SHA1

    c540353c431d11d29a051a1bf4a893862f89f329

    SHA256

    d9847a9bc30a4eb9bd66dce767349f61b2428c3372400a9289a551fe4257b49a

    SHA512

    16e4f3f35b6d659080f3d983eb95d601ff4b8faaaa3daa09bee149747895df9559aa94b4b1b4af5232a1e05ff8d2a2c034074d3f8029d3a3cea26791c9d48dfc

  • \Users\Admin\AppData\Roaming\Microsoft\XMMC\SearchIndexerDB.exe

    Filesize

    280KB

    MD5

    263693c99fe7284f6277b6ac9faa6019

    SHA1

    c540353c431d11d29a051a1bf4a893862f89f329

    SHA256

    d9847a9bc30a4eb9bd66dce767349f61b2428c3372400a9289a551fe4257b49a

    SHA512

    16e4f3f35b6d659080f3d983eb95d601ff4b8faaaa3daa09bee149747895df9559aa94b4b1b4af5232a1e05ff8d2a2c034074d3f8029d3a3cea26791c9d48dfc