Analysis

  • max time kernel
    143s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-08-2023 16:10

General

  • Target

    59a54d0ff309f6b2d6abf8a846f60ff6_mafia_nionspy_JC.exe

  • Size

    327KB

  • MD5

    59a54d0ff309f6b2d6abf8a846f60ff6

  • SHA1

    af5e7797c594370c6ab6a1664769e4d049b3bd28

  • SHA256

    d5c7486801d3f150a8c07b132592a6a1101cf0ef10b84629fc2e9cced4234ca7

  • SHA512

    54f52dd746f69f863c465c1b7c4c78b0d295e8573a30bf86df577a7510aa844042f538b5537c18b30276bb63de1741f5fe5c362e9940abd83fea7bf5a2e4de7c

  • SSDEEP

    6144:g2+JS2sFafI8U0obHCW/2a7XQcsPMjVWrG8KgbPzDh:g2TFafJiHCWBWPMjVWrXK0

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\59a54d0ff309f6b2d6abf8a846f60ff6_mafia_nionspy_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\59a54d0ff309f6b2d6abf8a846f60ff6_mafia_nionspy_JC.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2880
    • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\winit32.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\winit32.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\winit32.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3788
      • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\winit32.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\winit32.exe"
        3⤵
        • Executes dropped EXE
        PID:4016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\winit32.exe

    Filesize

    327KB

    MD5

    4ce088e90625eaa93d7ca23ca1269aaf

    SHA1

    aea2b4ac31dd3965a5fc2e100c889d9a2cbfcc5e

    SHA256

    c8a4369011e226578626c4e8e435f0dd64709175ffbbf238a7d455c351251ece

    SHA512

    6ba33d0779fa0c41d7b9f42b37a03c4e888fdca73789ed45ee1416d9f89d250e93d755bd14432a8359293fe4a2801a2af24a2e62072fb48868cf224a357e9c5d

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\winit32.exe

    Filesize

    327KB

    MD5

    4ce088e90625eaa93d7ca23ca1269aaf

    SHA1

    aea2b4ac31dd3965a5fc2e100c889d9a2cbfcc5e

    SHA256

    c8a4369011e226578626c4e8e435f0dd64709175ffbbf238a7d455c351251ece

    SHA512

    6ba33d0779fa0c41d7b9f42b37a03c4e888fdca73789ed45ee1416d9f89d250e93d755bd14432a8359293fe4a2801a2af24a2e62072fb48868cf224a357e9c5d

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\winit32.exe

    Filesize

    327KB

    MD5

    4ce088e90625eaa93d7ca23ca1269aaf

    SHA1

    aea2b4ac31dd3965a5fc2e100c889d9a2cbfcc5e

    SHA256

    c8a4369011e226578626c4e8e435f0dd64709175ffbbf238a7d455c351251ece

    SHA512

    6ba33d0779fa0c41d7b9f42b37a03c4e888fdca73789ed45ee1416d9f89d250e93d755bd14432a8359293fe4a2801a2af24a2e62072fb48868cf224a357e9c5d

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\winit32.exe

    Filesize

    327KB

    MD5

    4ce088e90625eaa93d7ca23ca1269aaf

    SHA1

    aea2b4ac31dd3965a5fc2e100c889d9a2cbfcc5e

    SHA256

    c8a4369011e226578626c4e8e435f0dd64709175ffbbf238a7d455c351251ece

    SHA512

    6ba33d0779fa0c41d7b9f42b37a03c4e888fdca73789ed45ee1416d9f89d250e93d755bd14432a8359293fe4a2801a2af24a2e62072fb48868cf224a357e9c5d