Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
02-08-2023 18:44
Static task
static1
Behavioral task
behavioral1
Sample
42460991da4fa50c2e9359a39d6082e3_mafia_nionspy_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
42460991da4fa50c2e9359a39d6082e3_mafia_nionspy_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
42460991da4fa50c2e9359a39d6082e3_mafia_nionspy_JC.exe
-
Size
288KB
-
MD5
42460991da4fa50c2e9359a39d6082e3
-
SHA1
d8d86b4b32dcd40956bd0f80f0016d032e6bb5e6
-
SHA256
cf66978760494cca4a00ed95b729a5cb90e8b1fab011f6b648f49c3267a9ab86
-
SHA512
601f2e6bf6339e8ccc64044b0ae42fa1888576f67b7a605b3c2c3df6e59d4429526078cc74e09f82ccabf66fc725e99791938883174c75f87a1e0db357add125
-
SSDEEP
6144:dQ+Tyfx4NF67Sbq2nW82X45gc3BaLZVS0mOoC8zbzDie:dQMyfmNFHfnWfhLZVHmOog
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3868 dwmsys.exe 1888 dwmsys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000_Classes\.exe\ = "systemui" 42460991da4fa50c2e9359a39d6082e3_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000_Classes\.exe\shell\runas 42460991da4fa50c2e9359a39d6082e3_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 42460991da4fa50c2e9359a39d6082e3_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000_Classes\systemui\Content-Type = "application/x-msdownload" 42460991da4fa50c2e9359a39d6082e3_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000_Classes\.exe\shell 42460991da4fa50c2e9359a39d6082e3_mafia_nionspy_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 42460991da4fa50c2e9359a39d6082e3_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000_Classes\Local Settings 42460991da4fa50c2e9359a39d6082e3_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000_Classes\systemui\shell 42460991da4fa50c2e9359a39d6082e3_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000_Classes\.exe 42460991da4fa50c2e9359a39d6082e3_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000_Classes\systemui 42460991da4fa50c2e9359a39d6082e3_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000_Classes\systemui\shell\open 42460991da4fa50c2e9359a39d6082e3_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000_Classes\systemui\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_32\\dwmsys.exe\" /START \"%1\" %*" 42460991da4fa50c2e9359a39d6082e3_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000_Classes\.exe\Content-Type = "application/x-msdownload" 42460991da4fa50c2e9359a39d6082e3_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000_Classes\.exe\DefaultIcon\ = "%1" 42460991da4fa50c2e9359a39d6082e3_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000_Classes\systemui\DefaultIcon 42460991da4fa50c2e9359a39d6082e3_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000_Classes\systemui\shell\runas\command 42460991da4fa50c2e9359a39d6082e3_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000_Classes\.exe\shell\runas\command 42460991da4fa50c2e9359a39d6082e3_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000_Classes\systemui\DefaultIcon\ = "%1" 42460991da4fa50c2e9359a39d6082e3_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000_Classes\.exe\shell\open\command 42460991da4fa50c2e9359a39d6082e3_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_32\\dwmsys.exe\" /START \"%1\" %*" 42460991da4fa50c2e9359a39d6082e3_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000_Classes\systemui\ = "Application" 42460991da4fa50c2e9359a39d6082e3_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000_Classes\systemui\shell\runas\command\ = "\"%1\" %*" 42460991da4fa50c2e9359a39d6082e3_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000_Classes\.exe\DefaultIcon 42460991da4fa50c2e9359a39d6082e3_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000_Classes\.exe\shell\open 42460991da4fa50c2e9359a39d6082e3_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 42460991da4fa50c2e9359a39d6082e3_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000_Classes\systemui\shell\open\command 42460991da4fa50c2e9359a39d6082e3_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000_Classes\systemui\shell\open\command\IsolatedCommand = "\"%1\" %*" 42460991da4fa50c2e9359a39d6082e3_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000_Classes\systemui\shell\runas 42460991da4fa50c2e9359a39d6082e3_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000_Classes\systemui\shell\runas\command\IsolatedCommand = "\"%1\" %*" 42460991da4fa50c2e9359a39d6082e3_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 42460991da4fa50c2e9359a39d6082e3_mafia_nionspy_JC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3868 dwmsys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3636 wrote to memory of 3868 3636 42460991da4fa50c2e9359a39d6082e3_mafia_nionspy_JC.exe 86 PID 3636 wrote to memory of 3868 3636 42460991da4fa50c2e9359a39d6082e3_mafia_nionspy_JC.exe 86 PID 3636 wrote to memory of 3868 3636 42460991da4fa50c2e9359a39d6082e3_mafia_nionspy_JC.exe 86 PID 3868 wrote to memory of 1888 3868 dwmsys.exe 87 PID 3868 wrote to memory of 1888 3868 dwmsys.exe 87 PID 3868 wrote to memory of 1888 3868 dwmsys.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\42460991da4fa50c2e9359a39d6082e3_mafia_nionspy_JC.exe"C:\Users\Admin\AppData\Local\Temp\42460991da4fa50c2e9359a39d6082e3_mafia_nionspy_JC.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\dwmsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\dwmsys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\dwmsys.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\dwmsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\dwmsys.exe"3⤵
- Executes dropped EXE
PID:1888
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288KB
MD5abdc165a003a319328281d5d29f61234
SHA16ddee15c1714070ba61a41aa4f54c09909c1c218
SHA256c783b354c40a8ce2d7d6c24a9c436779ed95832bb1c9c9dec3c3cbf567e70867
SHA512c5665fcb2926c72e1e007d80a8e409caa8d98f8857675caaee85f64f78589b1a2666ccf76040e8b15a544d9df0bd48fffc1191b09b4cf672a267faf49d133b1b
-
Filesize
288KB
MD5abdc165a003a319328281d5d29f61234
SHA16ddee15c1714070ba61a41aa4f54c09909c1c218
SHA256c783b354c40a8ce2d7d6c24a9c436779ed95832bb1c9c9dec3c3cbf567e70867
SHA512c5665fcb2926c72e1e007d80a8e409caa8d98f8857675caaee85f64f78589b1a2666ccf76040e8b15a544d9df0bd48fffc1191b09b4cf672a267faf49d133b1b
-
Filesize
288KB
MD5abdc165a003a319328281d5d29f61234
SHA16ddee15c1714070ba61a41aa4f54c09909c1c218
SHA256c783b354c40a8ce2d7d6c24a9c436779ed95832bb1c9c9dec3c3cbf567e70867
SHA512c5665fcb2926c72e1e007d80a8e409caa8d98f8857675caaee85f64f78589b1a2666ccf76040e8b15a544d9df0bd48fffc1191b09b4cf672a267faf49d133b1b
-
Filesize
288KB
MD5abdc165a003a319328281d5d29f61234
SHA16ddee15c1714070ba61a41aa4f54c09909c1c218
SHA256c783b354c40a8ce2d7d6c24a9c436779ed95832bb1c9c9dec3c3cbf567e70867
SHA512c5665fcb2926c72e1e007d80a8e409caa8d98f8857675caaee85f64f78589b1a2666ccf76040e8b15a544d9df0bd48fffc1191b09b4cf672a267faf49d133b1b