Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
17/08/2023, 15:19
Static task
static1
Behavioral task
behavioral1
Sample
14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe
-
Size
327KB
-
MD5
14239e1f728fd1cf0461298d0bc74500
-
SHA1
4febcd8c5ed64e7040c8def3af873d4d2d26ca1b
-
SHA256
e2b4e48f1f784653214a715670e3107f945894e8a1eb7cea4ec9cc1679f0ca4e
-
SHA512
7887540710ded5c0dbabf3024bc8476a559f0e0faad21a69dde118fd57be3c68e6f37ecf15183e301974a5ed343c1908f649c2f56b44b002327e5b8fb2b2b1b0
-
SSDEEP
6144:U2+JS2sFafI8U0obHCW/2a7XQcsPMjVWrG8KgbPzDh:U2TFafJiHCWBWPMjVWrXK0
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2828 SearchIndexerDB.exe 2928 SearchIndexerDB.exe -
Loads dropped DLL 4 IoCs
pid Process 2488 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe 2488 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe 2488 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe 2828 SearchIndexerDB.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 28 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\cmos 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\cmos\shell\open\command 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\.exe\DefaultIcon 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\cmos\ = "Application" 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\.exe\shell\open\command 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_amd64\\SearchIndexerDB.exe\" /START \"%1\" %*" 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\cmos\DefaultIcon 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\cmos\DefaultIcon\ = "%1" 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\.exe\shell\open 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\cmos\Content-Type = "application/x-msdownload" 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\cmos\shell 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\cmos\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_amd64\\SearchIndexerDB.exe\" /START \"%1\" %*" 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\cmos\shell\runas 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\.exe\ = "cmos" 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\.exe\shell\runas 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\.exe\shell 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\.exe\shell\runas\command 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\cmos\shell\open 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\cmos\shell\runas\command 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\cmos\shell\runas\command\ = "\"%1\" %*" 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\.exe 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\cmos\shell\runas\command\IsolatedCommand = "\"%1\" %*" 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\.exe\DefaultIcon\ = "%1" 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\cmos\shell\open\command\IsolatedCommand = "\"%1\" %*" 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\.exe\Content-Type = "application/x-msdownload" 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2828 SearchIndexerDB.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2828 2488 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe 28 PID 2488 wrote to memory of 2828 2488 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe 28 PID 2488 wrote to memory of 2828 2488 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe 28 PID 2488 wrote to memory of 2828 2488 14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe 28 PID 2828 wrote to memory of 2928 2828 SearchIndexerDB.exe 29 PID 2828 wrote to memory of 2928 2828 SearchIndexerDB.exe 29 PID 2828 wrote to memory of 2928 2828 SearchIndexerDB.exe 29 PID 2828 wrote to memory of 2928 2828 SearchIndexerDB.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe"C:\Users\Admin\AppData\Local\Temp\14239e1f728fd1cf0461298d0bc74500_mafia_nionspy_JC.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\SearchIndexerDB.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\SearchIndexerDB.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\SearchIndexerDB.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\SearchIndexerDB.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\SearchIndexerDB.exe"3⤵
- Executes dropped EXE
PID:2928
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
327KB
MD5798facb478aab6f3df3828cbf977c521
SHA1421375615469ac781d930d42be7a141d31a95098
SHA256fcf9bbfe3e13d65cd304630ab318722459e6df5e005488cc866f4daa3e7df640
SHA512208bf3cbdb2eb8c6d2e0890b985303b045c74821b8feef2211057e7dc8088641722041149014ee617683d1e5b8be45af913359359ba879d543a983e88e1fcf48
-
Filesize
327KB
MD5798facb478aab6f3df3828cbf977c521
SHA1421375615469ac781d930d42be7a141d31a95098
SHA256fcf9bbfe3e13d65cd304630ab318722459e6df5e005488cc866f4daa3e7df640
SHA512208bf3cbdb2eb8c6d2e0890b985303b045c74821b8feef2211057e7dc8088641722041149014ee617683d1e5b8be45af913359359ba879d543a983e88e1fcf48
-
Filesize
327KB
MD5798facb478aab6f3df3828cbf977c521
SHA1421375615469ac781d930d42be7a141d31a95098
SHA256fcf9bbfe3e13d65cd304630ab318722459e6df5e005488cc866f4daa3e7df640
SHA512208bf3cbdb2eb8c6d2e0890b985303b045c74821b8feef2211057e7dc8088641722041149014ee617683d1e5b8be45af913359359ba879d543a983e88e1fcf48
-
Filesize
327KB
MD5798facb478aab6f3df3828cbf977c521
SHA1421375615469ac781d930d42be7a141d31a95098
SHA256fcf9bbfe3e13d65cd304630ab318722459e6df5e005488cc866f4daa3e7df640
SHA512208bf3cbdb2eb8c6d2e0890b985303b045c74821b8feef2211057e7dc8088641722041149014ee617683d1e5b8be45af913359359ba879d543a983e88e1fcf48
-
Filesize
327KB
MD5798facb478aab6f3df3828cbf977c521
SHA1421375615469ac781d930d42be7a141d31a95098
SHA256fcf9bbfe3e13d65cd304630ab318722459e6df5e005488cc866f4daa3e7df640
SHA512208bf3cbdb2eb8c6d2e0890b985303b045c74821b8feef2211057e7dc8088641722041149014ee617683d1e5b8be45af913359359ba879d543a983e88e1fcf48
-
Filesize
327KB
MD5798facb478aab6f3df3828cbf977c521
SHA1421375615469ac781d930d42be7a141d31a95098
SHA256fcf9bbfe3e13d65cd304630ab318722459e6df5e005488cc866f4daa3e7df640
SHA512208bf3cbdb2eb8c6d2e0890b985303b045c74821b8feef2211057e7dc8088641722041149014ee617683d1e5b8be45af913359359ba879d543a983e88e1fcf48
-
Filesize
327KB
MD5798facb478aab6f3df3828cbf977c521
SHA1421375615469ac781d930d42be7a141d31a95098
SHA256fcf9bbfe3e13d65cd304630ab318722459e6df5e005488cc866f4daa3e7df640
SHA512208bf3cbdb2eb8c6d2e0890b985303b045c74821b8feef2211057e7dc8088641722041149014ee617683d1e5b8be45af913359359ba879d543a983e88e1fcf48
-
Filesize
327KB
MD5798facb478aab6f3df3828cbf977c521
SHA1421375615469ac781d930d42be7a141d31a95098
SHA256fcf9bbfe3e13d65cd304630ab318722459e6df5e005488cc866f4daa3e7df640
SHA512208bf3cbdb2eb8c6d2e0890b985303b045c74821b8feef2211057e7dc8088641722041149014ee617683d1e5b8be45af913359359ba879d543a983e88e1fcf48