Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2023, 10:03
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-22_881d04f0525d0ad641598b998ac8ed17_mafia_nionspy_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-22_881d04f0525d0ad641598b998ac8ed17_mafia_nionspy_JC.exe
Resource
win10v2004-20230831-en
General
-
Target
2023-08-22_881d04f0525d0ad641598b998ac8ed17_mafia_nionspy_JC.exe
-
Size
288KB
-
MD5
881d04f0525d0ad641598b998ac8ed17
-
SHA1
f6d8f49d278972b42e3205174288415ee34e410c
-
SHA256
b0fb1cf475cd61266560fa87aeef48f54b03abb18e9e120f8c4947a64f718b5a
-
SHA512
2e110c5f13768f1bef7b0dab8ab6c92f853c820ccbf93dcc790d9999e829b7afab29b891a98fa1d8025893d46cffa79097696b49cd986a75f541626e6f1104a9
-
SSDEEP
6144:GQ+Tyfx4NF67Sbq2nW82X45gc3BaLZVS0mOoC8zbzDie:GQMyfmNFHfnWfhLZVHmOog
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000\Control Panel\International\Geo\Nation 2023-08-22_881d04f0525d0ad641598b998ac8ed17_mafia_nionspy_JC.exe -
Executes dropped EXE 2 IoCs
pid Process 1216 winit32.exe 208 winit32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000_Classes\ntdriver\shell\runas\command\ = "\"%1\" %*" 2023-08-22_881d04f0525d0ad641598b998ac8ed17_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000_Classes\ntdriver\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_32\\winit32.exe\" /START \"%1\" %*" 2023-08-22_881d04f0525d0ad641598b998ac8ed17_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000_Classes\ntdriver\shell\open\command\IsolatedCommand = "\"%1\" %*" 2023-08-22_881d04f0525d0ad641598b998ac8ed17_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000_Classes\.exe\shell 2023-08-22_881d04f0525d0ad641598b998ac8ed17_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000_Classes\.exe\shell\runas\command 2023-08-22_881d04f0525d0ad641598b998ac8ed17_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000_Classes\ntdriver\shell 2023-08-22_881d04f0525d0ad641598b998ac8ed17_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000_Classes\ntdriver\DefaultIcon 2023-08-22_881d04f0525d0ad641598b998ac8ed17_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000_Classes\ntdriver\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2023-08-22_881d04f0525d0ad641598b998ac8ed17_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000_Classes\.exe 2023-08-22_881d04f0525d0ad641598b998ac8ed17_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000_Classes\.exe\ = "ntdriver" 2023-08-22_881d04f0525d0ad641598b998ac8ed17_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000_Classes\.exe\shell\open 2023-08-22_881d04f0525d0ad641598b998ac8ed17_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000_Classes\ntdriver\Content-Type = "application/x-msdownload" 2023-08-22_881d04f0525d0ad641598b998ac8ed17_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000_Classes\.exe\Content-Type = "application/x-msdownload" 2023-08-22_881d04f0525d0ad641598b998ac8ed17_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000_Classes\.exe\DefaultIcon 2023-08-22_881d04f0525d0ad641598b998ac8ed17_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000_Classes\.exe\shell\open\command 2023-08-22_881d04f0525d0ad641598b998ac8ed17_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000_Classes\Local Settings 2023-08-22_881d04f0525d0ad641598b998ac8ed17_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000_Classes\ntdriver\ = "Application" 2023-08-22_881d04f0525d0ad641598b998ac8ed17_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000_Classes\ntdriver\shell\open 2023-08-22_881d04f0525d0ad641598b998ac8ed17_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000_Classes\ntdriver\shell\runas 2023-08-22_881d04f0525d0ad641598b998ac8ed17_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_32\\winit32.exe\" /START \"%1\" %*" 2023-08-22_881d04f0525d0ad641598b998ac8ed17_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000_Classes\ntdriver\DefaultIcon\ = "%1" 2023-08-22_881d04f0525d0ad641598b998ac8ed17_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000_Classes\ntdriver\shell\runas\command 2023-08-22_881d04f0525d0ad641598b998ac8ed17_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2023-08-22_881d04f0525d0ad641598b998ac8ed17_mafia_nionspy_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2023-08-22_881d04f0525d0ad641598b998ac8ed17_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000_Classes\ntdriver\shell\open\command 2023-08-22_881d04f0525d0ad641598b998ac8ed17_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000_Classes\.exe\DefaultIcon\ = "%1" 2023-08-22_881d04f0525d0ad641598b998ac8ed17_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2023-08-22_881d04f0525d0ad641598b998ac8ed17_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000_Classes\ntdriver 2023-08-22_881d04f0525d0ad641598b998ac8ed17_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 2023-08-22_881d04f0525d0ad641598b998ac8ed17_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000_Classes\.exe\shell\runas 2023-08-22_881d04f0525d0ad641598b998ac8ed17_mafia_nionspy_JC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1216 winit32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4352 wrote to memory of 1216 4352 2023-08-22_881d04f0525d0ad641598b998ac8ed17_mafia_nionspy_JC.exe 85 PID 4352 wrote to memory of 1216 4352 2023-08-22_881d04f0525d0ad641598b998ac8ed17_mafia_nionspy_JC.exe 85 PID 4352 wrote to memory of 1216 4352 2023-08-22_881d04f0525d0ad641598b998ac8ed17_mafia_nionspy_JC.exe 85 PID 1216 wrote to memory of 208 1216 winit32.exe 86 PID 1216 wrote to memory of 208 1216 winit32.exe 86 PID 1216 wrote to memory of 208 1216 winit32.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-22_881d04f0525d0ad641598b998ac8ed17_mafia_nionspy_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-22_881d04f0525d0ad641598b998ac8ed17_mafia_nionspy_JC.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\winit32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\winit32.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\winit32.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\winit32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\winit32.exe"3⤵
- Executes dropped EXE
PID:208
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288KB
MD54919c54af5b41a9f1aff1bb47b492848
SHA16e8a2dc34d8b445ad55f21a797ef2b163d7f5930
SHA256e4b82a42b4ae423f4975fe275fe024c839e2d8554fb1d06cef0015ffc6ebd569
SHA512a20fba3e9154a4ddf812859570129f84d6cfef92ec2d2a7322b2a16d2a71d89e7dc25f6002e4660b1e41ed2019b8fe9d6e60ad427e1d32fa7128676dfe66c192
-
Filesize
288KB
MD54919c54af5b41a9f1aff1bb47b492848
SHA16e8a2dc34d8b445ad55f21a797ef2b163d7f5930
SHA256e4b82a42b4ae423f4975fe275fe024c839e2d8554fb1d06cef0015ffc6ebd569
SHA512a20fba3e9154a4ddf812859570129f84d6cfef92ec2d2a7322b2a16d2a71d89e7dc25f6002e4660b1e41ed2019b8fe9d6e60ad427e1d32fa7128676dfe66c192
-
Filesize
288KB
MD54919c54af5b41a9f1aff1bb47b492848
SHA16e8a2dc34d8b445ad55f21a797ef2b163d7f5930
SHA256e4b82a42b4ae423f4975fe275fe024c839e2d8554fb1d06cef0015ffc6ebd569
SHA512a20fba3e9154a4ddf812859570129f84d6cfef92ec2d2a7322b2a16d2a71d89e7dc25f6002e4660b1e41ed2019b8fe9d6e60ad427e1d32fa7128676dfe66c192
-
Filesize
288KB
MD54919c54af5b41a9f1aff1bb47b492848
SHA16e8a2dc34d8b445ad55f21a797ef2b163d7f5930
SHA256e4b82a42b4ae423f4975fe275fe024c839e2d8554fb1d06cef0015ffc6ebd569
SHA512a20fba3e9154a4ddf812859570129f84d6cfef92ec2d2a7322b2a16d2a71d89e7dc25f6002e4660b1e41ed2019b8fe9d6e60ad427e1d32fa7128676dfe66c192