Analysis

  • max time kernel
    125s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    05/08/2023, 10:17

General

  • Target

    689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe

  • Size

    327KB

  • MD5

    689f4d293ae75ccaadd357e9e2c0bc57

  • SHA1

    d31abbc65a249af92307f7d1a83b9715431d01b9

  • SHA256

    f5382028d1968413079f6077625cc279a385636eb0e0302f0ef8bfc8b01fba29

  • SHA512

    0d3a7dfb036db6e9051b8d2eef9d2952943dfefcafb2ae590217a13d22316066becb5dc8adc1caa45b7f5c6ba7f3ef1c84342f057dc86282a047504f1b175992

  • SSDEEP

    6144:o2+JS2sFafI8U0obHCW/2a7XQcsPMjVWrG89gkPzDhs2+JS2sFm:o2TFafJiHCWBWPMjVWrXfs2TFm

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe"
    1⤵
    • Loads dropped DLL
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2504
    • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\dwmsys.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\dwmsys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\dwmsys.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1992
      • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\dwmsys.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\dwmsys.exe"
        3⤵
        • Executes dropped EXE
        PID:2300

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\dwmsys.exe

    Filesize

    327KB

    MD5

    2d41f6468f2f43a87e48083eea804078

    SHA1

    8b82bb30a2bc2b2c87dd546f4fd3b07ea9af7b10

    SHA256

    677bd08294bdead36bb2cd203f24e2198a183c68f1e2b433092747bff4da5ff3

    SHA512

    3022c373e713bd8234a518b4b4a1f8b45e732efdeb51fcaefbe7ad32b7e7ca757c69aa0f6bba8d3428317dd6db9862d70418b6c0f6a43a7c35ac05bff858c09c

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\dwmsys.exe

    Filesize

    327KB

    MD5

    2d41f6468f2f43a87e48083eea804078

    SHA1

    8b82bb30a2bc2b2c87dd546f4fd3b07ea9af7b10

    SHA256

    677bd08294bdead36bb2cd203f24e2198a183c68f1e2b433092747bff4da5ff3

    SHA512

    3022c373e713bd8234a518b4b4a1f8b45e732efdeb51fcaefbe7ad32b7e7ca757c69aa0f6bba8d3428317dd6db9862d70418b6c0f6a43a7c35ac05bff858c09c

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\dwmsys.exe

    Filesize

    327KB

    MD5

    2d41f6468f2f43a87e48083eea804078

    SHA1

    8b82bb30a2bc2b2c87dd546f4fd3b07ea9af7b10

    SHA256

    677bd08294bdead36bb2cd203f24e2198a183c68f1e2b433092747bff4da5ff3

    SHA512

    3022c373e713bd8234a518b4b4a1f8b45e732efdeb51fcaefbe7ad32b7e7ca757c69aa0f6bba8d3428317dd6db9862d70418b6c0f6a43a7c35ac05bff858c09c

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\dwmsys.exe

    Filesize

    327KB

    MD5

    2d41f6468f2f43a87e48083eea804078

    SHA1

    8b82bb30a2bc2b2c87dd546f4fd3b07ea9af7b10

    SHA256

    677bd08294bdead36bb2cd203f24e2198a183c68f1e2b433092747bff4da5ff3

    SHA512

    3022c373e713bd8234a518b4b4a1f8b45e732efdeb51fcaefbe7ad32b7e7ca757c69aa0f6bba8d3428317dd6db9862d70418b6c0f6a43a7c35ac05bff858c09c

  • \Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\dwmsys.exe

    Filesize

    327KB

    MD5

    2d41f6468f2f43a87e48083eea804078

    SHA1

    8b82bb30a2bc2b2c87dd546f4fd3b07ea9af7b10

    SHA256

    677bd08294bdead36bb2cd203f24e2198a183c68f1e2b433092747bff4da5ff3

    SHA512

    3022c373e713bd8234a518b4b4a1f8b45e732efdeb51fcaefbe7ad32b7e7ca757c69aa0f6bba8d3428317dd6db9862d70418b6c0f6a43a7c35ac05bff858c09c

  • \Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\dwmsys.exe

    Filesize

    327KB

    MD5

    2d41f6468f2f43a87e48083eea804078

    SHA1

    8b82bb30a2bc2b2c87dd546f4fd3b07ea9af7b10

    SHA256

    677bd08294bdead36bb2cd203f24e2198a183c68f1e2b433092747bff4da5ff3

    SHA512

    3022c373e713bd8234a518b4b4a1f8b45e732efdeb51fcaefbe7ad32b7e7ca757c69aa0f6bba8d3428317dd6db9862d70418b6c0f6a43a7c35ac05bff858c09c

  • \Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\dwmsys.exe

    Filesize

    327KB

    MD5

    2d41f6468f2f43a87e48083eea804078

    SHA1

    8b82bb30a2bc2b2c87dd546f4fd3b07ea9af7b10

    SHA256

    677bd08294bdead36bb2cd203f24e2198a183c68f1e2b433092747bff4da5ff3

    SHA512

    3022c373e713bd8234a518b4b4a1f8b45e732efdeb51fcaefbe7ad32b7e7ca757c69aa0f6bba8d3428317dd6db9862d70418b6c0f6a43a7c35ac05bff858c09c