Analysis

  • max time kernel
    122s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    23-08-2023 16:41

General

  • Target

    78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe

  • Size

    280KB

  • MD5

    78d5ba9e6267c0ea1bf437728073246a

  • SHA1

    2839e104f6609e85cab9594d814aeaec39e79f9b

  • SHA256

    74913d370a3ae1a81323607ca957fef0a10ee1251d8df2a56dfd33aa2390106c

  • SHA512

    0d8d337dde272d7778a32ad22b089e489fc30c4e96a246da90d0d7d5fb1c6315755666c010788a365d275761d6d9063cca71568a4de21e5940f11e2b2c54f047

  • SSDEEP

    6144:7Tz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDK:7TBPFV0RyWl3h2E+7pl

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\78d5ba9e6267c0ea1bf437728073246a_mafia_nionspy_JC.exe"
    1⤵
    • Loads dropped DLL
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2624
    • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\SearchIndexerDB.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\SearchIndexerDB.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\SearchIndexerDB.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2404
      • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\SearchIndexerDB.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\SearchIndexerDB.exe"
        3⤵
        • Executes dropped EXE
        PID:1156

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\SearchIndexerDB.exe

    Filesize

    280KB

    MD5

    67ee4e2c9606f0ab2cb9fafb46b443f2

    SHA1

    93eb2518d6c8dfee9abd7018ca0c980834eefde1

    SHA256

    b9649039a59e84f52ce89c327169d8bcdbecd8132ef75591cd803d6f91f8ace7

    SHA512

    bdb923a77a2ddd92c397e92adb0523df487bbbeea5bab0a0e98863f1b30760f4b71544d66dfb7ecdd5906d6f07b88eb42eae0069b57925d7045901cc27476af7

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\SearchIndexerDB.exe

    Filesize

    280KB

    MD5

    67ee4e2c9606f0ab2cb9fafb46b443f2

    SHA1

    93eb2518d6c8dfee9abd7018ca0c980834eefde1

    SHA256

    b9649039a59e84f52ce89c327169d8bcdbecd8132ef75591cd803d6f91f8ace7

    SHA512

    bdb923a77a2ddd92c397e92adb0523df487bbbeea5bab0a0e98863f1b30760f4b71544d66dfb7ecdd5906d6f07b88eb42eae0069b57925d7045901cc27476af7

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\SearchIndexerDB.exe

    Filesize

    280KB

    MD5

    67ee4e2c9606f0ab2cb9fafb46b443f2

    SHA1

    93eb2518d6c8dfee9abd7018ca0c980834eefde1

    SHA256

    b9649039a59e84f52ce89c327169d8bcdbecd8132ef75591cd803d6f91f8ace7

    SHA512

    bdb923a77a2ddd92c397e92adb0523df487bbbeea5bab0a0e98863f1b30760f4b71544d66dfb7ecdd5906d6f07b88eb42eae0069b57925d7045901cc27476af7

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\SearchIndexerDB.exe

    Filesize

    280KB

    MD5

    67ee4e2c9606f0ab2cb9fafb46b443f2

    SHA1

    93eb2518d6c8dfee9abd7018ca0c980834eefde1

    SHA256

    b9649039a59e84f52ce89c327169d8bcdbecd8132ef75591cd803d6f91f8ace7

    SHA512

    bdb923a77a2ddd92c397e92adb0523df487bbbeea5bab0a0e98863f1b30760f4b71544d66dfb7ecdd5906d6f07b88eb42eae0069b57925d7045901cc27476af7

  • \Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\SearchIndexerDB.exe

    Filesize

    280KB

    MD5

    67ee4e2c9606f0ab2cb9fafb46b443f2

    SHA1

    93eb2518d6c8dfee9abd7018ca0c980834eefde1

    SHA256

    b9649039a59e84f52ce89c327169d8bcdbecd8132ef75591cd803d6f91f8ace7

    SHA512

    bdb923a77a2ddd92c397e92adb0523df487bbbeea5bab0a0e98863f1b30760f4b71544d66dfb7ecdd5906d6f07b88eb42eae0069b57925d7045901cc27476af7

  • \Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\SearchIndexerDB.exe

    Filesize

    280KB

    MD5

    67ee4e2c9606f0ab2cb9fafb46b443f2

    SHA1

    93eb2518d6c8dfee9abd7018ca0c980834eefde1

    SHA256

    b9649039a59e84f52ce89c327169d8bcdbecd8132ef75591cd803d6f91f8ace7

    SHA512

    bdb923a77a2ddd92c397e92adb0523df487bbbeea5bab0a0e98863f1b30760f4b71544d66dfb7ecdd5906d6f07b88eb42eae0069b57925d7045901cc27476af7

  • \Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\SearchIndexerDB.exe

    Filesize

    280KB

    MD5

    67ee4e2c9606f0ab2cb9fafb46b443f2

    SHA1

    93eb2518d6c8dfee9abd7018ca0c980834eefde1

    SHA256

    b9649039a59e84f52ce89c327169d8bcdbecd8132ef75591cd803d6f91f8ace7

    SHA512

    bdb923a77a2ddd92c397e92adb0523df487bbbeea5bab0a0e98863f1b30760f4b71544d66dfb7ecdd5906d6f07b88eb42eae0069b57925d7045901cc27476af7

  • \Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\SearchIndexerDB.exe

    Filesize

    280KB

    MD5

    67ee4e2c9606f0ab2cb9fafb46b443f2

    SHA1

    93eb2518d6c8dfee9abd7018ca0c980834eefde1

    SHA256

    b9649039a59e84f52ce89c327169d8bcdbecd8132ef75591cd803d6f91f8ace7

    SHA512

    bdb923a77a2ddd92c397e92adb0523df487bbbeea5bab0a0e98863f1b30760f4b71544d66dfb7ecdd5906d6f07b88eb42eae0069b57925d7045901cc27476af7