Analysis
-
max time kernel
122s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
23-08-2023 17:07
Static task
static1
Behavioral task
behavioral1
Sample
7a91596a794d81b1fb8b8cd79e86a351_mafia_nionspy_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
7a91596a794d81b1fb8b8cd79e86a351_mafia_nionspy_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
7a91596a794d81b1fb8b8cd79e86a351_mafia_nionspy_JC.exe
-
Size
288KB
-
MD5
7a91596a794d81b1fb8b8cd79e86a351
-
SHA1
a039367e3f19445db9ea32f279d230d5e88f5aa8
-
SHA256
456ec52fba24ea478cdc6277a64f9c901276578b45b51abb475ec7a5a8bfdc7e
-
SHA512
148ecd5401c088a7a87923eeca0bd3bda651058b94f547b53b93b919a0e574bc6c9de38d690433eaef7cce9ea4b3bbc5426e73e726097afae5ec3254b9af3bea
-
SSDEEP
6144:AdQ+Tyfx4NF67Sbq2nW82X45gc3BaLZVS0mOoC8zbzDie:MQMyfmNFHfnWfhLZVHmOog
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2920 taskhostsys.exe 2916 taskhostsys.exe -
Loads dropped DLL 4 IoCs
pid Process 1796 7a91596a794d81b1fb8b8cd79e86a351_mafia_nionspy_JC.exe 1796 7a91596a794d81b1fb8b8cd79e86a351_mafia_nionspy_JC.exe 1796 7a91596a794d81b1fb8b8cd79e86a351_mafia_nionspy_JC.exe 2920 taskhostsys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 28 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\jitc 7a91596a794d81b1fb8b8cd79e86a351_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\jitc\shell\open\command 7a91596a794d81b1fb8b8cd79e86a351_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\.exe\shell\open\command 7a91596a794d81b1fb8b8cd79e86a351_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\.exe\shell\runas 7a91596a794d81b1fb8b8cd79e86a351_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\jitc\Content-Type = "application/x-msdownload" 7a91596a794d81b1fb8b8cd79e86a351_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\jitc\shell\open\command\IsolatedCommand = "\"%1\" %*" 7a91596a794d81b1fb8b8cd79e86a351_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\jitc\shell\runas\command 7a91596a794d81b1fb8b8cd79e86a351_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\.exe 7a91596a794d81b1fb8b8cd79e86a351_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\jitc\shell 7a91596a794d81b1fb8b8cd79e86a351_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\jitc\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\XMMC\\taskhostsys.exe\" /START \"%1\" %*" 7a91596a794d81b1fb8b8cd79e86a351_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\.exe\DefaultIcon 7a91596a794d81b1fb8b8cd79e86a351_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\jitc\shell\runas\command\ = "\"%1\" %*" 7a91596a794d81b1fb8b8cd79e86a351_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\.exe\Content-Type = "application/x-msdownload" 7a91596a794d81b1fb8b8cd79e86a351_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\.exe\shell 7a91596a794d81b1fb8b8cd79e86a351_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" 7a91596a794d81b1fb8b8cd79e86a351_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\.exe\shell\open 7a91596a794d81b1fb8b8cd79e86a351_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\.exe\shell\runas\command 7a91596a794d81b1fb8b8cd79e86a351_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\.exe\ = "jitc" 7a91596a794d81b1fb8b8cd79e86a351_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\.exe\DefaultIcon\ = "%1" 7a91596a794d81b1fb8b8cd79e86a351_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\XMMC\\taskhostsys.exe\" /START \"%1\" %*" 7a91596a794d81b1fb8b8cd79e86a351_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 7a91596a794d81b1fb8b8cd79e86a351_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 7a91596a794d81b1fb8b8cd79e86a351_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\jitc\DefaultIcon 7a91596a794d81b1fb8b8cd79e86a351_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\jitc\DefaultIcon\ = "%1" 7a91596a794d81b1fb8b8cd79e86a351_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\jitc\shell\open 7a91596a794d81b1fb8b8cd79e86a351_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\jitc\shell\runas 7a91596a794d81b1fb8b8cd79e86a351_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\jitc\shell\runas\command\IsolatedCommand = "\"%1\" %*" 7a91596a794d81b1fb8b8cd79e86a351_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000_CLASSES\jitc\ = "Application" 7a91596a794d81b1fb8b8cd79e86a351_mafia_nionspy_JC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2920 taskhostsys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1796 wrote to memory of 2920 1796 7a91596a794d81b1fb8b8cd79e86a351_mafia_nionspy_JC.exe 28 PID 1796 wrote to memory of 2920 1796 7a91596a794d81b1fb8b8cd79e86a351_mafia_nionspy_JC.exe 28 PID 1796 wrote to memory of 2920 1796 7a91596a794d81b1fb8b8cd79e86a351_mafia_nionspy_JC.exe 28 PID 1796 wrote to memory of 2920 1796 7a91596a794d81b1fb8b8cd79e86a351_mafia_nionspy_JC.exe 28 PID 2920 wrote to memory of 2916 2920 taskhostsys.exe 29 PID 2920 wrote to memory of 2916 2920 taskhostsys.exe 29 PID 2920 wrote to memory of 2916 2920 taskhostsys.exe 29 PID 2920 wrote to memory of 2916 2920 taskhostsys.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a91596a794d81b1fb8b8cd79e86a351_mafia_nionspy_JC.exe"C:\Users\Admin\AppData\Local\Temp\7a91596a794d81b1fb8b8cd79e86a351_mafia_nionspy_JC.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe"3⤵
- Executes dropped EXE
PID:2916
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288KB
MD51f1ec1877fcae9f3b58b4eea528796be
SHA150ac815be6d004042342cb8906d8069d41461c3d
SHA256d7622ad34da89267bafae758f6b7ac5fe6624aa35194305eea28b2be801e9044
SHA51238a90d4674ab5abd58822732a948743883e6a7c825e17ade359f95b40d4ce60b27af6986a58b40a82d37fbf0cfb04c754e2ac8be82909e725826d42f76735e9e
-
Filesize
288KB
MD51f1ec1877fcae9f3b58b4eea528796be
SHA150ac815be6d004042342cb8906d8069d41461c3d
SHA256d7622ad34da89267bafae758f6b7ac5fe6624aa35194305eea28b2be801e9044
SHA51238a90d4674ab5abd58822732a948743883e6a7c825e17ade359f95b40d4ce60b27af6986a58b40a82d37fbf0cfb04c754e2ac8be82909e725826d42f76735e9e
-
Filesize
288KB
MD51f1ec1877fcae9f3b58b4eea528796be
SHA150ac815be6d004042342cb8906d8069d41461c3d
SHA256d7622ad34da89267bafae758f6b7ac5fe6624aa35194305eea28b2be801e9044
SHA51238a90d4674ab5abd58822732a948743883e6a7c825e17ade359f95b40d4ce60b27af6986a58b40a82d37fbf0cfb04c754e2ac8be82909e725826d42f76735e9e
-
Filesize
288KB
MD51f1ec1877fcae9f3b58b4eea528796be
SHA150ac815be6d004042342cb8906d8069d41461c3d
SHA256d7622ad34da89267bafae758f6b7ac5fe6624aa35194305eea28b2be801e9044
SHA51238a90d4674ab5abd58822732a948743883e6a7c825e17ade359f95b40d4ce60b27af6986a58b40a82d37fbf0cfb04c754e2ac8be82909e725826d42f76735e9e
-
Filesize
288KB
MD51f1ec1877fcae9f3b58b4eea528796be
SHA150ac815be6d004042342cb8906d8069d41461c3d
SHA256d7622ad34da89267bafae758f6b7ac5fe6624aa35194305eea28b2be801e9044
SHA51238a90d4674ab5abd58822732a948743883e6a7c825e17ade359f95b40d4ce60b27af6986a58b40a82d37fbf0cfb04c754e2ac8be82909e725826d42f76735e9e
-
Filesize
288KB
MD51f1ec1877fcae9f3b58b4eea528796be
SHA150ac815be6d004042342cb8906d8069d41461c3d
SHA256d7622ad34da89267bafae758f6b7ac5fe6624aa35194305eea28b2be801e9044
SHA51238a90d4674ab5abd58822732a948743883e6a7c825e17ade359f95b40d4ce60b27af6986a58b40a82d37fbf0cfb04c754e2ac8be82909e725826d42f76735e9e
-
Filesize
288KB
MD51f1ec1877fcae9f3b58b4eea528796be
SHA150ac815be6d004042342cb8906d8069d41461c3d
SHA256d7622ad34da89267bafae758f6b7ac5fe6624aa35194305eea28b2be801e9044
SHA51238a90d4674ab5abd58822732a948743883e6a7c825e17ade359f95b40d4ce60b27af6986a58b40a82d37fbf0cfb04c754e2ac8be82909e725826d42f76735e9e
-
Filesize
288KB
MD51f1ec1877fcae9f3b58b4eea528796be
SHA150ac815be6d004042342cb8906d8069d41461c3d
SHA256d7622ad34da89267bafae758f6b7ac5fe6624aa35194305eea28b2be801e9044
SHA51238a90d4674ab5abd58822732a948743883e6a7c825e17ade359f95b40d4ce60b27af6986a58b40a82d37fbf0cfb04c754e2ac8be82909e725826d42f76735e9e