Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
17-08-2023 16:10
Static task
static1
Behavioral task
behavioral1
Sample
16aa90611f367f20eacd4f384e1254e7_mafia_nionspy_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
16aa90611f367f20eacd4f384e1254e7_mafia_nionspy_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
16aa90611f367f20eacd4f384e1254e7_mafia_nionspy_JC.exe
-
Size
280KB
-
MD5
16aa90611f367f20eacd4f384e1254e7
-
SHA1
43e4e2be7e578ee8fcd6f55bf443d98b077039d9
-
SHA256
5e9cc688437de2af468f2286704c73888ba3476be3fc2f829d41b6fb01f485d8
-
SHA512
90e2bdabff65ebc7d6baaeee3a57afeb64a2dec8c2417622e5333b274ca3689cb1bd555546f7471341dbf25a6dc99ae058e5b978f084c17b1c8c02725a1e1410
-
SSDEEP
6144:NTz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDK:NTBPFV0RyWl3h2E+7pl
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3772 SearchIndexerDB.exe 5052 SearchIndexerDB.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\cmos\shell\runas\command\IsolatedCommand = "\"%1\" %*" 16aa90611f367f20eacd4f384e1254e7_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_amd64\\SearchIndexerDB.exe\" /START \"%1\" %*" 16aa90611f367f20eacd4f384e1254e7_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 16aa90611f367f20eacd4f384e1254e7_mafia_nionspy_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 16aa90611f367f20eacd4f384e1254e7_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\cmos\shell\open 16aa90611f367f20eacd4f384e1254e7_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\cmos\shell\runas 16aa90611f367f20eacd4f384e1254e7_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\.exe\ = "cmos" 16aa90611f367f20eacd4f384e1254e7_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\.exe\Content-Type = "application/x-msdownload" 16aa90611f367f20eacd4f384e1254e7_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\.exe\DefaultIcon\ = "%1" 16aa90611f367f20eacd4f384e1254e7_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\.exe\shell 16aa90611f367f20eacd4f384e1254e7_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\.exe\shell\runas\command 16aa90611f367f20eacd4f384e1254e7_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\cmos\shell\open\command 16aa90611f367f20eacd4f384e1254e7_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\cmos\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_amd64\\SearchIndexerDB.exe\" /START \"%1\" %*" 16aa90611f367f20eacd4f384e1254e7_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\cmos\ = "Application" 16aa90611f367f20eacd4f384e1254e7_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\.exe\shell\open 16aa90611f367f20eacd4f384e1254e7_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\cmos 16aa90611f367f20eacd4f384e1254e7_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\.exe 16aa90611f367f20eacd4f384e1254e7_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\.exe\shell\runas 16aa90611f367f20eacd4f384e1254e7_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\cmos\shell 16aa90611f367f20eacd4f384e1254e7_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\cmos\shell\runas\command 16aa90611f367f20eacd4f384e1254e7_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\cmos\shell\runas\command\ = "\"%1\" %*" 16aa90611f367f20eacd4f384e1254e7_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 16aa90611f367f20eacd4f384e1254e7_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 16aa90611f367f20eacd4f384e1254e7_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\Local Settings 16aa90611f367f20eacd4f384e1254e7_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\cmos\DefaultIcon 16aa90611f367f20eacd4f384e1254e7_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\.exe\DefaultIcon 16aa90611f367f20eacd4f384e1254e7_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\cmos\DefaultIcon\ = "%1" 16aa90611f367f20eacd4f384e1254e7_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\cmos\shell\open\command\IsolatedCommand = "\"%1\" %*" 16aa90611f367f20eacd4f384e1254e7_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\.exe\shell\open\command 16aa90611f367f20eacd4f384e1254e7_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\cmos\Content-Type = "application/x-msdownload" 16aa90611f367f20eacd4f384e1254e7_mafia_nionspy_JC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3772 SearchIndexerDB.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 700 wrote to memory of 3772 700 16aa90611f367f20eacd4f384e1254e7_mafia_nionspy_JC.exe 84 PID 700 wrote to memory of 3772 700 16aa90611f367f20eacd4f384e1254e7_mafia_nionspy_JC.exe 84 PID 700 wrote to memory of 3772 700 16aa90611f367f20eacd4f384e1254e7_mafia_nionspy_JC.exe 84 PID 3772 wrote to memory of 5052 3772 SearchIndexerDB.exe 85 PID 3772 wrote to memory of 5052 3772 SearchIndexerDB.exe 85 PID 3772 wrote to memory of 5052 3772 SearchIndexerDB.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\16aa90611f367f20eacd4f384e1254e7_mafia_nionspy_JC.exe"C:\Users\Admin\AppData\Local\Temp\16aa90611f367f20eacd4f384e1254e7_mafia_nionspy_JC.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\SearchIndexerDB.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\SearchIndexerDB.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\SearchIndexerDB.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\SearchIndexerDB.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\SearchIndexerDB.exe"3⤵
- Executes dropped EXE
PID:5052
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD5a80d778931d945f8cf65537b8ff49b5b
SHA1cd41a1db302b07527080f6d565c9edc2ef68ee76
SHA256e61a683b7f0cbd2232b861446d0eb13f1b8ea57150e3e48a9af9acd177bfcda5
SHA5123dd998d988a631a6e2c8ec273dc89ffad8591cecd3281c0294400d934b9d67574b675a01ee7920a8d446b42429c2db3e66f006292210a99ff706a9fbf74685c5
-
Filesize
280KB
MD5a80d778931d945f8cf65537b8ff49b5b
SHA1cd41a1db302b07527080f6d565c9edc2ef68ee76
SHA256e61a683b7f0cbd2232b861446d0eb13f1b8ea57150e3e48a9af9acd177bfcda5
SHA5123dd998d988a631a6e2c8ec273dc89ffad8591cecd3281c0294400d934b9d67574b675a01ee7920a8d446b42429c2db3e66f006292210a99ff706a9fbf74685c5
-
Filesize
280KB
MD5a80d778931d945f8cf65537b8ff49b5b
SHA1cd41a1db302b07527080f6d565c9edc2ef68ee76
SHA256e61a683b7f0cbd2232b861446d0eb13f1b8ea57150e3e48a9af9acd177bfcda5
SHA5123dd998d988a631a6e2c8ec273dc89ffad8591cecd3281c0294400d934b9d67574b675a01ee7920a8d446b42429c2db3e66f006292210a99ff706a9fbf74685c5
-
Filesize
280KB
MD5a80d778931d945f8cf65537b8ff49b5b
SHA1cd41a1db302b07527080f6d565c9edc2ef68ee76
SHA256e61a683b7f0cbd2232b861446d0eb13f1b8ea57150e3e48a9af9acd177bfcda5
SHA5123dd998d988a631a6e2c8ec273dc89ffad8591cecd3281c0294400d934b9d67574b675a01ee7920a8d446b42429c2db3e66f006292210a99ff706a9fbf74685c5