Analysis

  • max time kernel
    138s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230824-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/08/2023, 19:09

General

  • Target

    8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe

  • Size

    280KB

  • MD5

    8ae0bd66c2e1749ac801fc59434637f2

  • SHA1

    72b421fa0f6593dbd34f3175ea6038e7d1af1afe

  • SHA256

    97d7e13a2b083bd5f8651159a631a21509c433ef45a6f692188d2bd2227168d9

  • SHA512

    0441d60cd5346360e4b47e096f3462698382a0c2087b84fdd31b8f8e597589e5ccd07ce8505425f9b62d7ec3a8f9a2d5ffe8ec4891cedc005471237ef9db4b58

  • SSDEEP

    6144:eTz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDK:eTBPFV0RyWl3h2E+7pl

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4492
    • C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\dwmsys.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\dwmsys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\dwmsys.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3792
      • C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\dwmsys.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\dwmsys.exe"
        3⤵
        • Executes dropped EXE
        PID:4260

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\dwmsys.exe

          Filesize

          280KB

          MD5

          fd582088e669cdc67512a3f3f18e4919

          SHA1

          82fea55ef96c7b653e2b6ae4bb257c68fa343a31

          SHA256

          a67d81da3e367551691a9bd5f5f47d8e428624ddf82e715e938f6cbd6409ac0f

          SHA512

          2f66bc49b30e09c1641e9ec358ff67d15b1e2ae4e53c1c9d41bccac9f64c9ba1cb38285a6773de212ee9bed82cf7173d6837b3a8d15a74bbde676ce14ba78ace

        • C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\dwmsys.exe

          Filesize

          280KB

          MD5

          fd582088e669cdc67512a3f3f18e4919

          SHA1

          82fea55ef96c7b653e2b6ae4bb257c68fa343a31

          SHA256

          a67d81da3e367551691a9bd5f5f47d8e428624ddf82e715e938f6cbd6409ac0f

          SHA512

          2f66bc49b30e09c1641e9ec358ff67d15b1e2ae4e53c1c9d41bccac9f64c9ba1cb38285a6773de212ee9bed82cf7173d6837b3a8d15a74bbde676ce14ba78ace

        • C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\dwmsys.exe

          Filesize

          280KB

          MD5

          fd582088e669cdc67512a3f3f18e4919

          SHA1

          82fea55ef96c7b653e2b6ae4bb257c68fa343a31

          SHA256

          a67d81da3e367551691a9bd5f5f47d8e428624ddf82e715e938f6cbd6409ac0f

          SHA512

          2f66bc49b30e09c1641e9ec358ff67d15b1e2ae4e53c1c9d41bccac9f64c9ba1cb38285a6773de212ee9bed82cf7173d6837b3a8d15a74bbde676ce14ba78ace

        • C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\dwmsys.exe

          Filesize

          280KB

          MD5

          fd582088e669cdc67512a3f3f18e4919

          SHA1

          82fea55ef96c7b653e2b6ae4bb257c68fa343a31

          SHA256

          a67d81da3e367551691a9bd5f5f47d8e428624ddf82e715e938f6cbd6409ac0f

          SHA512

          2f66bc49b30e09c1641e9ec358ff67d15b1e2ae4e53c1c9d41bccac9f64c9ba1cb38285a6773de212ee9bed82cf7173d6837b3a8d15a74bbde676ce14ba78ace