Analysis
-
max time kernel
138s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230824-en -
resource tags
arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2023, 19:09
Static task
static1
Behavioral task
behavioral1
Sample
8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe
Resource
win10v2004-20230824-en
General
-
Target
8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe
-
Size
280KB
-
MD5
8ae0bd66c2e1749ac801fc59434637f2
-
SHA1
72b421fa0f6593dbd34f3175ea6038e7d1af1afe
-
SHA256
97d7e13a2b083bd5f8651159a631a21509c433ef45a6f692188d2bd2227168d9
-
SHA512
0441d60cd5346360e4b47e096f3462698382a0c2087b84fdd31b8f8e597589e5ccd07ce8505425f9b62d7ec3a8f9a2d5ffe8ec4891cedc005471237ef9db4b58
-
SSDEEP
6144:eTz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDK:eTBPFV0RyWl3h2E+7pl
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3792 dwmsys.exe 4260 dwmsys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-642304425-1816607141-2958861556-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\XMMC\\dwmsys.exe\" /START \"%1\" %*" 8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-642304425-1816607141-2958861556-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-642304425-1816607141-2958861556-1000_Classes\systemui\ = "Application" 8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-642304425-1816607141-2958861556-1000_Classes\.exe\shell\runas\command 8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-642304425-1816607141-2958861556-1000_Classes\systemui\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\XMMC\\dwmsys.exe\" /START \"%1\" %*" 8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-642304425-1816607141-2958861556-1000_Classes\systemui\shell 8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-642304425-1816607141-2958861556-1000_Classes\systemui\shell\open 8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-642304425-1816607141-2958861556-1000_Classes\.exe\ = "systemui" 8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-642304425-1816607141-2958861556-1000_Classes\.exe\shell 8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-642304425-1816607141-2958861556-1000_Classes\systemui\shell\open\command 8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-642304425-1816607141-2958861556-1000_Classes\.exe\Content-Type = "application/x-msdownload" 8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-642304425-1816607141-2958861556-1000_Classes\.exe\DefaultIcon\ = "%1" 8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-642304425-1816607141-2958861556-1000_Classes\systemui\shell\runas\command\ = "\"%1\" %*" 8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-642304425-1816607141-2958861556-1000_Classes\systemui\shell\runas\command\IsolatedCommand = "\"%1\" %*" 8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-642304425-1816607141-2958861556-1000_Classes\systemui\shell\runas 8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-642304425-1816607141-2958861556-1000_Classes\.exe\shell\open\command 8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-642304425-1816607141-2958861556-1000_Classes\.exe\shell\open 8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-642304425-1816607141-2958861556-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-642304425-1816607141-2958861556-1000_Classes\systemui 8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-642304425-1816607141-2958861556-1000_Classes\.exe 8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-642304425-1816607141-2958861556-1000_Classes\.exe\DefaultIcon 8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-642304425-1816607141-2958861556-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-642304425-1816607141-2958861556-1000_Classes\.exe\shell\runas 8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-642304425-1816607141-2958861556-1000_Classes\systemui\shell\runas\command 8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-642304425-1816607141-2958861556-1000_Classes\systemui\DefaultIcon 8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-642304425-1816607141-2958861556-1000_Classes\systemui\DefaultIcon\ = "%1" 8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-642304425-1816607141-2958861556-1000_Classes\systemui\shell\open\command\IsolatedCommand = "\"%1\" %*" 8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-642304425-1816607141-2958861556-1000_Classes\Local Settings 8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-642304425-1816607141-2958861556-1000_Classes\systemui\Content-Type = "application/x-msdownload" 8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3792 dwmsys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4492 wrote to memory of 3792 4492 8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe 85 PID 4492 wrote to memory of 3792 4492 8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe 85 PID 4492 wrote to memory of 3792 4492 8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe 85 PID 3792 wrote to memory of 4260 3792 dwmsys.exe 86 PID 3792 wrote to memory of 4260 3792 dwmsys.exe 86 PID 3792 wrote to memory of 4260 3792 dwmsys.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe"C:\Users\Admin\AppData\Local\Temp\8ae0bd66c2e1749ac801fc59434637f2_mafia_nionspy_JC.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\dwmsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\dwmsys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\dwmsys.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\dwmsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\dwmsys.exe"3⤵
- Executes dropped EXE
PID:4260
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD5fd582088e669cdc67512a3f3f18e4919
SHA182fea55ef96c7b653e2b6ae4bb257c68fa343a31
SHA256a67d81da3e367551691a9bd5f5f47d8e428624ddf82e715e938f6cbd6409ac0f
SHA5122f66bc49b30e09c1641e9ec358ff67d15b1e2ae4e53c1c9d41bccac9f64c9ba1cb38285a6773de212ee9bed82cf7173d6837b3a8d15a74bbde676ce14ba78ace
-
Filesize
280KB
MD5fd582088e669cdc67512a3f3f18e4919
SHA182fea55ef96c7b653e2b6ae4bb257c68fa343a31
SHA256a67d81da3e367551691a9bd5f5f47d8e428624ddf82e715e938f6cbd6409ac0f
SHA5122f66bc49b30e09c1641e9ec358ff67d15b1e2ae4e53c1c9d41bccac9f64c9ba1cb38285a6773de212ee9bed82cf7173d6837b3a8d15a74bbde676ce14ba78ace
-
Filesize
280KB
MD5fd582088e669cdc67512a3f3f18e4919
SHA182fea55ef96c7b653e2b6ae4bb257c68fa343a31
SHA256a67d81da3e367551691a9bd5f5f47d8e428624ddf82e715e938f6cbd6409ac0f
SHA5122f66bc49b30e09c1641e9ec358ff67d15b1e2ae4e53c1c9d41bccac9f64c9ba1cb38285a6773de212ee9bed82cf7173d6837b3a8d15a74bbde676ce14ba78ace
-
Filesize
280KB
MD5fd582088e669cdc67512a3f3f18e4919
SHA182fea55ef96c7b653e2b6ae4bb257c68fa343a31
SHA256a67d81da3e367551691a9bd5f5f47d8e428624ddf82e715e938f6cbd6409ac0f
SHA5122f66bc49b30e09c1641e9ec358ff67d15b1e2ae4e53c1c9d41bccac9f64c9ba1cb38285a6773de212ee9bed82cf7173d6837b3a8d15a74bbde676ce14ba78ace