Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
21/08/2023, 18:38
Static task
static1
Behavioral task
behavioral1
Sample
66f2599f7689970fb76602b7d7824db8_mafia_nionspy_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
66f2599f7689970fb76602b7d7824db8_mafia_nionspy_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
66f2599f7689970fb76602b7d7824db8_mafia_nionspy_JC.exe
-
Size
327KB
-
MD5
66f2599f7689970fb76602b7d7824db8
-
SHA1
ad897208d5f6a04ba3d4756d6922196d83b7f109
-
SHA256
6a8670f997a7b3a7c4525b3c65b071ba9c4a67edb23a01c3ffd3b639849d4bd7
-
SHA512
8962d98512dfac856bdc3c5f20bffd984faf876fa6a0970336d5aa5a37ba149a0daeab08d2b9159722218ce601e795e0f01feed92b2c94c4b153d3b61fe55826
-
SSDEEP
6144:q2+JS2sFafI8U0obHCW/2a7XQcsPMjVWrG8KgbPzDh:q2TFafJiHCWBWPMjVWrXK0
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2528 csrssys.exe 2976 csrssys.exe -
Loads dropped DLL 4 IoCs
pid Process 1136 66f2599f7689970fb76602b7d7824db8_mafia_nionspy_JC.exe 1136 66f2599f7689970fb76602b7d7824db8_mafia_nionspy_JC.exe 1136 66f2599f7689970fb76602b7d7824db8_mafia_nionspy_JC.exe 2528 csrssys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 28 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\.exe\DefaultIcon 66f2599f7689970fb76602b7d7824db8_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\.exe\shell 66f2599f7689970fb76602b7d7824db8_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\wexplorer\ = "Application" 66f2599f7689970fb76602b7d7824db8_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\wexplorer\shell\open\command 66f2599f7689970fb76602b7d7824db8_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\wexplorer\shell\runas 66f2599f7689970fb76602b7d7824db8_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\wexplorer\shell\runas\command 66f2599f7689970fb76602b7d7824db8_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\.exe\shell\open 66f2599f7689970fb76602b7d7824db8_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\.exe\shell\runas\command 66f2599f7689970fb76602b7d7824db8_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\wexplorer\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\XMMC\\csrssys.exe\" /START \"%1\" %*" 66f2599f7689970fb76602b7d7824db8_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\.exe\ = "wexplorer" 66f2599f7689970fb76602b7d7824db8_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\.exe\shell\open\command 66f2599f7689970fb76602b7d7824db8_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\wexplorer\Content-Type = "application/x-msdownload" 66f2599f7689970fb76602b7d7824db8_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\wexplorer\shell\open 66f2599f7689970fb76602b7d7824db8_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\wexplorer\DefaultIcon 66f2599f7689970fb76602b7d7824db8_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\wexplorer\shell\open\command\IsolatedCommand = "\"%1\" %*" 66f2599f7689970fb76602b7d7824db8_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\.exe\DefaultIcon\ = "%1" 66f2599f7689970fb76602b7d7824db8_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\.exe\Content-Type = "application/x-msdownload" 66f2599f7689970fb76602b7d7824db8_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\.exe\shell\runas 66f2599f7689970fb76602b7d7824db8_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 66f2599f7689970fb76602b7d7824db8_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\wexplorer\shell 66f2599f7689970fb76602b7d7824db8_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\.exe 66f2599f7689970fb76602b7d7824db8_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\XMMC\\csrssys.exe\" /START \"%1\" %*" 66f2599f7689970fb76602b7d7824db8_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\wexplorer\shell\runas\command\IsolatedCommand = "\"%1\" %*" 66f2599f7689970fb76602b7d7824db8_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 66f2599f7689970fb76602b7d7824db8_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" 66f2599f7689970fb76602b7d7824db8_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\wexplorer 66f2599f7689970fb76602b7d7824db8_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\wexplorer\DefaultIcon\ = "%1" 66f2599f7689970fb76602b7d7824db8_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000_CLASSES\wexplorer\shell\runas\command\ = "\"%1\" %*" 66f2599f7689970fb76602b7d7824db8_mafia_nionspy_JC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2528 csrssys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1136 wrote to memory of 2528 1136 66f2599f7689970fb76602b7d7824db8_mafia_nionspy_JC.exe 28 PID 1136 wrote to memory of 2528 1136 66f2599f7689970fb76602b7d7824db8_mafia_nionspy_JC.exe 28 PID 1136 wrote to memory of 2528 1136 66f2599f7689970fb76602b7d7824db8_mafia_nionspy_JC.exe 28 PID 1136 wrote to memory of 2528 1136 66f2599f7689970fb76602b7d7824db8_mafia_nionspy_JC.exe 28 PID 2528 wrote to memory of 2976 2528 csrssys.exe 29 PID 2528 wrote to memory of 2976 2528 csrssys.exe 29 PID 2528 wrote to memory of 2976 2528 csrssys.exe 29 PID 2528 wrote to memory of 2976 2528 csrssys.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\66f2599f7689970fb76602b7d7824db8_mafia_nionspy_JC.exe"C:\Users\Admin\AppData\Local\Temp\66f2599f7689970fb76602b7d7824db8_mafia_nionspy_JC.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\csrssys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\csrssys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\csrssys.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\csrssys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\csrssys.exe"3⤵
- Executes dropped EXE
PID:2976
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
327KB
MD5b581dc0349691ab39bb7784c04856504
SHA14865be1b54e9b563fa0018137708f58774e631e9
SHA256890d5d27b161f6d43ed555cd890eb75c2980863ff484be57e7f5fe964ab55b92
SHA512d66c840178c10a3fede56ea581c7785673767dbe295f433bc87d81bbdbd6d89db94985984d6c34497bb5b1bea7b9f378711c688836aa06cabe3d239b77d9106b
-
Filesize
327KB
MD5b581dc0349691ab39bb7784c04856504
SHA14865be1b54e9b563fa0018137708f58774e631e9
SHA256890d5d27b161f6d43ed555cd890eb75c2980863ff484be57e7f5fe964ab55b92
SHA512d66c840178c10a3fede56ea581c7785673767dbe295f433bc87d81bbdbd6d89db94985984d6c34497bb5b1bea7b9f378711c688836aa06cabe3d239b77d9106b
-
Filesize
327KB
MD5b581dc0349691ab39bb7784c04856504
SHA14865be1b54e9b563fa0018137708f58774e631e9
SHA256890d5d27b161f6d43ed555cd890eb75c2980863ff484be57e7f5fe964ab55b92
SHA512d66c840178c10a3fede56ea581c7785673767dbe295f433bc87d81bbdbd6d89db94985984d6c34497bb5b1bea7b9f378711c688836aa06cabe3d239b77d9106b
-
Filesize
327KB
MD5b581dc0349691ab39bb7784c04856504
SHA14865be1b54e9b563fa0018137708f58774e631e9
SHA256890d5d27b161f6d43ed555cd890eb75c2980863ff484be57e7f5fe964ab55b92
SHA512d66c840178c10a3fede56ea581c7785673767dbe295f433bc87d81bbdbd6d89db94985984d6c34497bb5b1bea7b9f378711c688836aa06cabe3d239b77d9106b
-
Filesize
327KB
MD5b581dc0349691ab39bb7784c04856504
SHA14865be1b54e9b563fa0018137708f58774e631e9
SHA256890d5d27b161f6d43ed555cd890eb75c2980863ff484be57e7f5fe964ab55b92
SHA512d66c840178c10a3fede56ea581c7785673767dbe295f433bc87d81bbdbd6d89db94985984d6c34497bb5b1bea7b9f378711c688836aa06cabe3d239b77d9106b
-
Filesize
327KB
MD5b581dc0349691ab39bb7784c04856504
SHA14865be1b54e9b563fa0018137708f58774e631e9
SHA256890d5d27b161f6d43ed555cd890eb75c2980863ff484be57e7f5fe964ab55b92
SHA512d66c840178c10a3fede56ea581c7785673767dbe295f433bc87d81bbdbd6d89db94985984d6c34497bb5b1bea7b9f378711c688836aa06cabe3d239b77d9106b
-
Filesize
327KB
MD5b581dc0349691ab39bb7784c04856504
SHA14865be1b54e9b563fa0018137708f58774e631e9
SHA256890d5d27b161f6d43ed555cd890eb75c2980863ff484be57e7f5fe964ab55b92
SHA512d66c840178c10a3fede56ea581c7785673767dbe295f433bc87d81bbdbd6d89db94985984d6c34497bb5b1bea7b9f378711c688836aa06cabe3d239b77d9106b
-
Filesize
327KB
MD5b581dc0349691ab39bb7784c04856504
SHA14865be1b54e9b563fa0018137708f58774e631e9
SHA256890d5d27b161f6d43ed555cd890eb75c2980863ff484be57e7f5fe964ab55b92
SHA512d66c840178c10a3fede56ea581c7785673767dbe295f433bc87d81bbdbd6d89db94985984d6c34497bb5b1bea7b9f378711c688836aa06cabe3d239b77d9106b