Analysis

  • max time kernel
    137s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230824-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/08/2023, 13:16

General

  • Target

    90fb96afa20c0a1fba49b0623b675638_mafia_nionspy_JC.exe

  • Size

    344KB

  • MD5

    90fb96afa20c0a1fba49b0623b675638

  • SHA1

    5dc23e4cdf8a7d530a6c7b4c0b150f501f33641a

  • SHA256

    52951d622b8e4a9313f6e156d6551eacee77dec75a11ea4ab2e33d59c44e08aa

  • SHA512

    7934b2d1cae7df79e187651e8cc55bb6fd4341220a60a2b2bb611c24851d6e5dcef0e09dcd8b911c8fe043c78b7f615e4203c53ccc04077c18f3e58241828429

  • SSDEEP

    6144:cTz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDBRm1+gmN:cTBPFV0RyWl3h2E+7pYm0

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\90fb96afa20c0a1fba49b0623b675638_mafia_nionspy_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\90fb96afa20c0a1fba49b0623b675638_mafia_nionspy_JC.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:5100
    • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\lsassys.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\lsassys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\lsassys.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4264
      • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\lsassys.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\lsassys.exe"
        3⤵
        • Executes dropped EXE
        PID:4076

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\lsassys.exe

    Filesize

    344KB

    MD5

    bfaf25bf1ba72ed5cda2db9de5b5869b

    SHA1

    7f2fa7774c67999f7020738b949d4b48a0430bf9

    SHA256

    ae6120b34f2db8897e393199529b72c3e470cae8638a455340b4fdc606897ec1

    SHA512

    3bcb44181c0fe21bb6b1dc5a7b9776f413f93639af392b81997ddd78d6d5ee0cc17762bd9a8613e6669a6236294319d0441fd0f2bf640a99c67874760f613f2a

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\lsassys.exe

    Filesize

    344KB

    MD5

    bfaf25bf1ba72ed5cda2db9de5b5869b

    SHA1

    7f2fa7774c67999f7020738b949d4b48a0430bf9

    SHA256

    ae6120b34f2db8897e393199529b72c3e470cae8638a455340b4fdc606897ec1

    SHA512

    3bcb44181c0fe21bb6b1dc5a7b9776f413f93639af392b81997ddd78d6d5ee0cc17762bd9a8613e6669a6236294319d0441fd0f2bf640a99c67874760f613f2a

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\lsassys.exe

    Filesize

    344KB

    MD5

    bfaf25bf1ba72ed5cda2db9de5b5869b

    SHA1

    7f2fa7774c67999f7020738b949d4b48a0430bf9

    SHA256

    ae6120b34f2db8897e393199529b72c3e470cae8638a455340b4fdc606897ec1

    SHA512

    3bcb44181c0fe21bb6b1dc5a7b9776f413f93639af392b81997ddd78d6d5ee0cc17762bd9a8613e6669a6236294319d0441fd0f2bf640a99c67874760f613f2a

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\lsassys.exe

    Filesize

    344KB

    MD5

    bfaf25bf1ba72ed5cda2db9de5b5869b

    SHA1

    7f2fa7774c67999f7020738b949d4b48a0430bf9

    SHA256

    ae6120b34f2db8897e393199529b72c3e470cae8638a455340b4fdc606897ec1

    SHA512

    3bcb44181c0fe21bb6b1dc5a7b9776f413f93639af392b81997ddd78d6d5ee0cc17762bd9a8613e6669a6236294319d0441fd0f2bf640a99c67874760f613f2a