Analysis
-
max time kernel
125s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
19/08/2023, 13:27
Static task
static1
Behavioral task
behavioral1
Sample
40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe
-
Size
274KB
-
MD5
40a616a43a96915cc4432f45ee823449
-
SHA1
c552302d9e469ce76fbc2f8c6be51d977f62719f
-
SHA256
ef9402b441644ff25e57fbe3e9da15584d20752153d2d06a801009a69dd1c6fa
-
SHA512
7f72a14fed8e6e3aed4de89fcf76f294170d7380ac2d8245737cb6b1b84c9c2c9d06008170669a1a59664b9a192413fe1795c7b1349227e04f2a49f4fad3808d
-
SSDEEP
6144:lYvZ6brUj+bvqHXSpWr2Kqz83Oad3Jg4PlPDIQ+KLzDDg:lYvEbrUjp3SpWggd3JBPlPDIQ3g
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2808 winit32.exe 1812 winit32.exe -
Loads dropped DLL 3 IoCs
pid Process 688 40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe 688 40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe 688 40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 28 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\.exe\DefaultIcon\ = "%1" 40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\ntdriver\shell\open 40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\ntdriver\shell\runas 40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\.exe\shell 40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_amd64\\winit32.exe\" /START \"%1\" %*" 40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\ntdriver 40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\ntdriver\shell\open\command 40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\.exe\ = "ntdriver" 40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\ntdriver\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_amd64\\winit32.exe\" /START \"%1\" %*" 40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\.exe\shell\runas\command 40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" 40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\ntdriver\DefaultIcon 40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\ntdriver\shell\runas\command\ = "\"%1\" %*" 40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\.exe 40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\.exe\Content-Type = "application/x-msdownload" 40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\.exe\shell\runas 40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\ntdriver\shell\runas\command 40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\.exe\DefaultIcon 40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\.exe\shell\open 40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\ntdriver\ = "Application" 40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\ntdriver\DefaultIcon\ = "%1" 40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\ntdriver\shell 40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\.exe\shell\open\command 40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\ntdriver\Content-Type = "application/x-msdownload" 40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\ntdriver\shell\open\command\IsolatedCommand = "\"%1\" %*" 40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\ntdriver\shell\runas\command\IsolatedCommand = "\"%1\" %*" 40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2808 winit32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 688 wrote to memory of 2808 688 40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe 28 PID 688 wrote to memory of 2808 688 40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe 28 PID 688 wrote to memory of 2808 688 40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe 28 PID 688 wrote to memory of 2808 688 40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe 28 PID 2808 wrote to memory of 1812 2808 winit32.exe 29 PID 2808 wrote to memory of 1812 2808 winit32.exe 29 PID 2808 wrote to memory of 1812 2808 winit32.exe 29 PID 2808 wrote to memory of 1812 2808 winit32.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe"C:\Users\Admin\AppData\Local\Temp\40a616a43a96915cc4432f45ee823449_mafia_nionspy_JC.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\winit32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\winit32.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\winit32.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\winit32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\winit32.exe"3⤵
- Executes dropped EXE
PID:1812
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274KB
MD5b09cc4a41de30d0efd5b00388e1a8a13
SHA14459e993e52a1e646f6cf6a523dad2f05e90712d
SHA256f9c6497c5620cfdebbde456ab5babf3334d7184b234624a0c1c146bfd57d33a7
SHA512a323b0c90278eb772c0b38a11a97ae06be78001061a1d6bc3635e81b962c94a9e2c35365d696c061c0023a36a8621cf1317b2a51363f0d869f0f5b510090efda
-
Filesize
274KB
MD5b09cc4a41de30d0efd5b00388e1a8a13
SHA14459e993e52a1e646f6cf6a523dad2f05e90712d
SHA256f9c6497c5620cfdebbde456ab5babf3334d7184b234624a0c1c146bfd57d33a7
SHA512a323b0c90278eb772c0b38a11a97ae06be78001061a1d6bc3635e81b962c94a9e2c35365d696c061c0023a36a8621cf1317b2a51363f0d869f0f5b510090efda
-
Filesize
274KB
MD5b09cc4a41de30d0efd5b00388e1a8a13
SHA14459e993e52a1e646f6cf6a523dad2f05e90712d
SHA256f9c6497c5620cfdebbde456ab5babf3334d7184b234624a0c1c146bfd57d33a7
SHA512a323b0c90278eb772c0b38a11a97ae06be78001061a1d6bc3635e81b962c94a9e2c35365d696c061c0023a36a8621cf1317b2a51363f0d869f0f5b510090efda
-
Filesize
274KB
MD5b09cc4a41de30d0efd5b00388e1a8a13
SHA14459e993e52a1e646f6cf6a523dad2f05e90712d
SHA256f9c6497c5620cfdebbde456ab5babf3334d7184b234624a0c1c146bfd57d33a7
SHA512a323b0c90278eb772c0b38a11a97ae06be78001061a1d6bc3635e81b962c94a9e2c35365d696c061c0023a36a8621cf1317b2a51363f0d869f0f5b510090efda
-
Filesize
274KB
MD5b09cc4a41de30d0efd5b00388e1a8a13
SHA14459e993e52a1e646f6cf6a523dad2f05e90712d
SHA256f9c6497c5620cfdebbde456ab5babf3334d7184b234624a0c1c146bfd57d33a7
SHA512a323b0c90278eb772c0b38a11a97ae06be78001061a1d6bc3635e81b962c94a9e2c35365d696c061c0023a36a8621cf1317b2a51363f0d869f0f5b510090efda
-
Filesize
274KB
MD5b09cc4a41de30d0efd5b00388e1a8a13
SHA14459e993e52a1e646f6cf6a523dad2f05e90712d
SHA256f9c6497c5620cfdebbde456ab5babf3334d7184b234624a0c1c146bfd57d33a7
SHA512a323b0c90278eb772c0b38a11a97ae06be78001061a1d6bc3635e81b962c94a9e2c35365d696c061c0023a36a8621cf1317b2a51363f0d869f0f5b510090efda
-
Filesize
274KB
MD5b09cc4a41de30d0efd5b00388e1a8a13
SHA14459e993e52a1e646f6cf6a523dad2f05e90712d
SHA256f9c6497c5620cfdebbde456ab5babf3334d7184b234624a0c1c146bfd57d33a7
SHA512a323b0c90278eb772c0b38a11a97ae06be78001061a1d6bc3635e81b962c94a9e2c35365d696c061c0023a36a8621cf1317b2a51363f0d869f0f5b510090efda