Analysis
-
max time kernel
125s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
05/08/2023, 10:17
Static task
static1
Behavioral task
behavioral1
Sample
689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe
-
Size
327KB
-
MD5
689f4d293ae75ccaadd357e9e2c0bc57
-
SHA1
d31abbc65a249af92307f7d1a83b9715431d01b9
-
SHA256
f5382028d1968413079f6077625cc279a385636eb0e0302f0ef8bfc8b01fba29
-
SHA512
0d3a7dfb036db6e9051b8d2eef9d2952943dfefcafb2ae590217a13d22316066becb5dc8adc1caa45b7f5c6ba7f3ef1c84342f057dc86282a047504f1b175992
-
SSDEEP
6144:o2+JS2sFafI8U0obHCW/2a7XQcsPMjVWrG89gkPzDhs2+JS2sFm:o2TFafJiHCWBWPMjVWrXfs2TFm
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1992 dwmsys.exe 2300 dwmsys.exe -
Loads dropped DLL 3 IoCs
pid Process 2504 689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe 2504 689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe 2504 689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 28 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\systemui 689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\systemui\shell 689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\.exe\Content-Type = "application/x-msdownload" 689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\.exe\ = "systemui" 689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\systemui\Content-Type = "application/x-msdownload" 689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\systemui\shell\open\command 689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\systemui\shell\runas\command\ = "\"%1\" %*" 689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\.exe\shell 689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\systemui\ = "Application" 689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\systemui\shell\runas\command 689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\systemui\DefaultIcon\ = "%1" 689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\.exe 689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\systemui\shell\runas 689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\.exe\DefaultIcon 689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\.exe\shell\open\command 689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\systemui\DefaultIcon 689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\.exe\DefaultIcon\ = "%1" 689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\.exe\shell\open 689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\.exe\shell\runas 689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" 689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\systemui\shell\open 689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\systemui\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_x86_64\\dwmsys.exe\" /START \"%1\" %*" 689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\systemui\shell\open\command\IsolatedCommand = "\"%1\" %*" 689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\systemui\shell\runas\command\IsolatedCommand = "\"%1\" %*" 689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_x86_64\\dwmsys.exe\" /START \"%1\" %*" 689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\.exe\shell\runas\command 689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1992 dwmsys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2504 wrote to memory of 1992 2504 689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe 28 PID 2504 wrote to memory of 1992 2504 689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe 28 PID 2504 wrote to memory of 1992 2504 689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe 28 PID 2504 wrote to memory of 1992 2504 689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe 28 PID 1992 wrote to memory of 2300 1992 dwmsys.exe 29 PID 1992 wrote to memory of 2300 1992 dwmsys.exe 29 PID 1992 wrote to memory of 2300 1992 dwmsys.exe 29 PID 1992 wrote to memory of 2300 1992 dwmsys.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe"C:\Users\Admin\AppData\Local\Temp\689f4d293ae75ccaadd357e9e2c0bc57_mafia_nionspy_JC.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\dwmsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\dwmsys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\dwmsys.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\dwmsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\dwmsys.exe"3⤵
- Executes dropped EXE
PID:2300
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
327KB
MD52d41f6468f2f43a87e48083eea804078
SHA18b82bb30a2bc2b2c87dd546f4fd3b07ea9af7b10
SHA256677bd08294bdead36bb2cd203f24e2198a183c68f1e2b433092747bff4da5ff3
SHA5123022c373e713bd8234a518b4b4a1f8b45e732efdeb51fcaefbe7ad32b7e7ca757c69aa0f6bba8d3428317dd6db9862d70418b6c0f6a43a7c35ac05bff858c09c
-
Filesize
327KB
MD52d41f6468f2f43a87e48083eea804078
SHA18b82bb30a2bc2b2c87dd546f4fd3b07ea9af7b10
SHA256677bd08294bdead36bb2cd203f24e2198a183c68f1e2b433092747bff4da5ff3
SHA5123022c373e713bd8234a518b4b4a1f8b45e732efdeb51fcaefbe7ad32b7e7ca757c69aa0f6bba8d3428317dd6db9862d70418b6c0f6a43a7c35ac05bff858c09c
-
Filesize
327KB
MD52d41f6468f2f43a87e48083eea804078
SHA18b82bb30a2bc2b2c87dd546f4fd3b07ea9af7b10
SHA256677bd08294bdead36bb2cd203f24e2198a183c68f1e2b433092747bff4da5ff3
SHA5123022c373e713bd8234a518b4b4a1f8b45e732efdeb51fcaefbe7ad32b7e7ca757c69aa0f6bba8d3428317dd6db9862d70418b6c0f6a43a7c35ac05bff858c09c
-
Filesize
327KB
MD52d41f6468f2f43a87e48083eea804078
SHA18b82bb30a2bc2b2c87dd546f4fd3b07ea9af7b10
SHA256677bd08294bdead36bb2cd203f24e2198a183c68f1e2b433092747bff4da5ff3
SHA5123022c373e713bd8234a518b4b4a1f8b45e732efdeb51fcaefbe7ad32b7e7ca757c69aa0f6bba8d3428317dd6db9862d70418b6c0f6a43a7c35ac05bff858c09c
-
Filesize
327KB
MD52d41f6468f2f43a87e48083eea804078
SHA18b82bb30a2bc2b2c87dd546f4fd3b07ea9af7b10
SHA256677bd08294bdead36bb2cd203f24e2198a183c68f1e2b433092747bff4da5ff3
SHA5123022c373e713bd8234a518b4b4a1f8b45e732efdeb51fcaefbe7ad32b7e7ca757c69aa0f6bba8d3428317dd6db9862d70418b6c0f6a43a7c35ac05bff858c09c
-
Filesize
327KB
MD52d41f6468f2f43a87e48083eea804078
SHA18b82bb30a2bc2b2c87dd546f4fd3b07ea9af7b10
SHA256677bd08294bdead36bb2cd203f24e2198a183c68f1e2b433092747bff4da5ff3
SHA5123022c373e713bd8234a518b4b4a1f8b45e732efdeb51fcaefbe7ad32b7e7ca757c69aa0f6bba8d3428317dd6db9862d70418b6c0f6a43a7c35ac05bff858c09c
-
Filesize
327KB
MD52d41f6468f2f43a87e48083eea804078
SHA18b82bb30a2bc2b2c87dd546f4fd3b07ea9af7b10
SHA256677bd08294bdead36bb2cd203f24e2198a183c68f1e2b433092747bff4da5ff3
SHA5123022c373e713bd8234a518b4b4a1f8b45e732efdeb51fcaefbe7ad32b7e7ca757c69aa0f6bba8d3428317dd6db9862d70418b6c0f6a43a7c35ac05bff858c09c