Analysis

  • max time kernel
    125s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2023, 13:27

General

  • Target

    40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe

  • Size

    274KB

  • MD5

    40a616a43a96915cc4432f45ee823449

  • SHA1

    c552302d9e469ce76fbc2f8c6be51d977f62719f

  • SHA256

    ef9402b441644ff25e57fbe3e9da15584d20752153d2d06a801009a69dd1c6fa

  • SHA512

    7f72a14fed8e6e3aed4de89fcf76f294170d7380ac2d8245737cb6b1b84c9c2c9d06008170669a1a59664b9a192413fe1795c7b1349227e04f2a49f4fad3808d

  • SSDEEP

    6144:lYvZ6brUj+bvqHXSpWr2Kqz83Oad3Jg4PlPDIQ+KLzDDg:lYvEbrUjp3SpWggd3JBPlPDIQ3g

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe"
    1⤵
    • Loads dropped DLL
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:688
    • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\winit32.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\winit32.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\winit32.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2808
      • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\winit32.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\winit32.exe"
        3⤵
        • Executes dropped EXE
        PID:1812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\winit32.exe

    Filesize

    274KB

    MD5

    b09cc4a41de30d0efd5b00388e1a8a13

    SHA1

    4459e993e52a1e646f6cf6a523dad2f05e90712d

    SHA256

    f9c6497c5620cfdebbde456ab5babf3334d7184b234624a0c1c146bfd57d33a7

    SHA512

    a323b0c90278eb772c0b38a11a97ae06be78001061a1d6bc3635e81b962c94a9e2c35365d696c061c0023a36a8621cf1317b2a51363f0d869f0f5b510090efda

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\winit32.exe

    Filesize

    274KB

    MD5

    b09cc4a41de30d0efd5b00388e1a8a13

    SHA1

    4459e993e52a1e646f6cf6a523dad2f05e90712d

    SHA256

    f9c6497c5620cfdebbde456ab5babf3334d7184b234624a0c1c146bfd57d33a7

    SHA512

    a323b0c90278eb772c0b38a11a97ae06be78001061a1d6bc3635e81b962c94a9e2c35365d696c061c0023a36a8621cf1317b2a51363f0d869f0f5b510090efda

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\winit32.exe

    Filesize

    274KB

    MD5

    b09cc4a41de30d0efd5b00388e1a8a13

    SHA1

    4459e993e52a1e646f6cf6a523dad2f05e90712d

    SHA256

    f9c6497c5620cfdebbde456ab5babf3334d7184b234624a0c1c146bfd57d33a7

    SHA512

    a323b0c90278eb772c0b38a11a97ae06be78001061a1d6bc3635e81b962c94a9e2c35365d696c061c0023a36a8621cf1317b2a51363f0d869f0f5b510090efda

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\winit32.exe

    Filesize

    274KB

    MD5

    b09cc4a41de30d0efd5b00388e1a8a13

    SHA1

    4459e993e52a1e646f6cf6a523dad2f05e90712d

    SHA256

    f9c6497c5620cfdebbde456ab5babf3334d7184b234624a0c1c146bfd57d33a7

    SHA512

    a323b0c90278eb772c0b38a11a97ae06be78001061a1d6bc3635e81b962c94a9e2c35365d696c061c0023a36a8621cf1317b2a51363f0d869f0f5b510090efda

  • \Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\winit32.exe

    Filesize

    274KB

    MD5

    b09cc4a41de30d0efd5b00388e1a8a13

    SHA1

    4459e993e52a1e646f6cf6a523dad2f05e90712d

    SHA256

    f9c6497c5620cfdebbde456ab5babf3334d7184b234624a0c1c146bfd57d33a7

    SHA512

    a323b0c90278eb772c0b38a11a97ae06be78001061a1d6bc3635e81b962c94a9e2c35365d696c061c0023a36a8621cf1317b2a51363f0d869f0f5b510090efda

  • \Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\winit32.exe

    Filesize

    274KB

    MD5

    b09cc4a41de30d0efd5b00388e1a8a13

    SHA1

    4459e993e52a1e646f6cf6a523dad2f05e90712d

    SHA256

    f9c6497c5620cfdebbde456ab5babf3334d7184b234624a0c1c146bfd57d33a7

    SHA512

    a323b0c90278eb772c0b38a11a97ae06be78001061a1d6bc3635e81b962c94a9e2c35365d696c061c0023a36a8621cf1317b2a51363f0d869f0f5b510090efda

  • \Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\winit32.exe

    Filesize

    274KB

    MD5

    b09cc4a41de30d0efd5b00388e1a8a13

    SHA1

    4459e993e52a1e646f6cf6a523dad2f05e90712d

    SHA256

    f9c6497c5620cfdebbde456ab5babf3334d7184b234624a0c1c146bfd57d33a7

    SHA512

    a323b0c90278eb772c0b38a11a97ae06be78001061a1d6bc3635e81b962c94a9e2c35365d696c061c0023a36a8621cf1317b2a51363f0d869f0f5b510090efda