Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2023, 18:52
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-27_4c37ec3072feeb2fc78fe17a177c26d2_mafia_nionspy_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-27_4c37ec3072feeb2fc78fe17a177c26d2_mafia_nionspy_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-27_4c37ec3072feeb2fc78fe17a177c26d2_mafia_nionspy_JC.exe
-
Size
288KB
-
MD5
4c37ec3072feeb2fc78fe17a177c26d2
-
SHA1
0fd1189488dabd7e1d29ed18c7a42df9fcdd3b1c
-
SHA256
cd62c6ff30bcd1a46a3548bc02e04061bb4b7a8e6cb5d6426c82a258fd96392b
-
SHA512
5d785899e75954bddb44f81bc500d8d4591a1644903bde54c112f5e7ef68c3a3c4b750f2ed467ef1a6af6159883cd4dd59f95aa109dab830e5afd59ac993c67b
-
SSDEEP
6144:GQ+Tyfx4NF67Sbq2nW82X45gc3BaLZVS0mOoC8zbzDie:GQMyfmNFHfnWfhLZVHmOog
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation 2023-08-27_4c37ec3072feeb2fc78fe17a177c26d2_mafia_nionspy_JC.exe -
Executes dropped EXE 2 IoCs
pid Process 220 wlogon32.exe 4612 wlogon32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\haldriver\ = "Application" 2023-08-27_4c37ec3072feeb2fc78fe17a177c26d2_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\.exe\shell\open\command 2023-08-27_4c37ec3072feeb2fc78fe17a177c26d2_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\.exe\shell\runas\command 2023-08-27_4c37ec3072feeb2fc78fe17a177c26d2_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\.exe\shell\runas 2023-08-27_4c37ec3072feeb2fc78fe17a177c26d2_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\haldriver\shell 2023-08-27_4c37ec3072feeb2fc78fe17a177c26d2_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\haldriver\shell\runas\command\ = "\"%1\" %*" 2023-08-27_4c37ec3072feeb2fc78fe17a177c26d2_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings 2023-08-27_4c37ec3072feeb2fc78fe17a177c26d2_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\haldriver\DefaultIcon 2023-08-27_4c37ec3072feeb2fc78fe17a177c26d2_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\haldriver\shell\open 2023-08-27_4c37ec3072feeb2fc78fe17a177c26d2_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\haldriver\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2023-08-27_4c37ec3072feeb2fc78fe17a177c26d2_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\.exe\shell 2023-08-27_4c37ec3072feeb2fc78fe17a177c26d2_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\haldriver\Content-Type = "application/x-msdownload" 2023-08-27_4c37ec3072feeb2fc78fe17a177c26d2_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\.exe\Content-Type = "application/x-msdownload" 2023-08-27_4c37ec3072feeb2fc78fe17a177c26d2_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\.exe\DefaultIcon\ = "%1" 2023-08-27_4c37ec3072feeb2fc78fe17a177c26d2_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_32\\wlogon32.exe\" /START \"%1\" %*" 2023-08-27_4c37ec3072feeb2fc78fe17a177c26d2_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\haldriver\shell\open\command\IsolatedCommand = "\"%1\" %*" 2023-08-27_4c37ec3072feeb2fc78fe17a177c26d2_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\haldriver\shell\runas\command 2023-08-27_4c37ec3072feeb2fc78fe17a177c26d2_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2023-08-27_4c37ec3072feeb2fc78fe17a177c26d2_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\haldriver\shell\open\command 2023-08-27_4c37ec3072feeb2fc78fe17a177c26d2_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\haldriver\shell\runas 2023-08-27_4c37ec3072feeb2fc78fe17a177c26d2_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\.exe\DefaultIcon 2023-08-27_4c37ec3072feeb2fc78fe17a177c26d2_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2023-08-27_4c37ec3072feeb2fc78fe17a177c26d2_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\haldriver\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_32\\wlogon32.exe\" /START \"%1\" %*" 2023-08-27_4c37ec3072feeb2fc78fe17a177c26d2_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 2023-08-27_4c37ec3072feeb2fc78fe17a177c26d2_mafia_nionspy_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2023-08-27_4c37ec3072feeb2fc78fe17a177c26d2_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\.exe\shell\open 2023-08-27_4c37ec3072feeb2fc78fe17a177c26d2_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\haldriver 2023-08-27_4c37ec3072feeb2fc78fe17a177c26d2_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\haldriver\DefaultIcon\ = "%1" 2023-08-27_4c37ec3072feeb2fc78fe17a177c26d2_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\.exe 2023-08-27_4c37ec3072feeb2fc78fe17a177c26d2_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\.exe\ = "haldriver" 2023-08-27_4c37ec3072feeb2fc78fe17a177c26d2_mafia_nionspy_JC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 220 wlogon32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2116 wrote to memory of 220 2116 2023-08-27_4c37ec3072feeb2fc78fe17a177c26d2_mafia_nionspy_JC.exe 86 PID 2116 wrote to memory of 220 2116 2023-08-27_4c37ec3072feeb2fc78fe17a177c26d2_mafia_nionspy_JC.exe 86 PID 2116 wrote to memory of 220 2116 2023-08-27_4c37ec3072feeb2fc78fe17a177c26d2_mafia_nionspy_JC.exe 86 PID 220 wrote to memory of 4612 220 wlogon32.exe 87 PID 220 wrote to memory of 4612 220 wlogon32.exe 87 PID 220 wrote to memory of 4612 220 wlogon32.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-27_4c37ec3072feeb2fc78fe17a177c26d2_mafia_nionspy_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-27_4c37ec3072feeb2fc78fe17a177c26d2_mafia_nionspy_JC.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\wlogon32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\wlogon32.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\wlogon32.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\wlogon32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\wlogon32.exe"3⤵
- Executes dropped EXE
PID:4612
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288KB
MD50575b2733904fd45cd162631815278c7
SHA101801c1702b5eb4e75372b8f2583f3562f48eea5
SHA25624f99c9f43628c7c98931a4dd18374b801ae9c73e25d6c00cdf2575cb6d82eae
SHA5121110342f1398f2ea21c17b6220e75da1a5d797c7b2cb857b91797292d6ef9c8c9540b8747028821f7eb800570886cf9f20f286d838390eb5378173afbfe59e11
-
Filesize
288KB
MD50575b2733904fd45cd162631815278c7
SHA101801c1702b5eb4e75372b8f2583f3562f48eea5
SHA25624f99c9f43628c7c98931a4dd18374b801ae9c73e25d6c00cdf2575cb6d82eae
SHA5121110342f1398f2ea21c17b6220e75da1a5d797c7b2cb857b91797292d6ef9c8c9540b8747028821f7eb800570886cf9f20f286d838390eb5378173afbfe59e11
-
Filesize
288KB
MD50575b2733904fd45cd162631815278c7
SHA101801c1702b5eb4e75372b8f2583f3562f48eea5
SHA25624f99c9f43628c7c98931a4dd18374b801ae9c73e25d6c00cdf2575cb6d82eae
SHA5121110342f1398f2ea21c17b6220e75da1a5d797c7b2cb857b91797292d6ef9c8c9540b8747028821f7eb800570886cf9f20f286d838390eb5378173afbfe59e11
-
Filesize
288KB
MD50575b2733904fd45cd162631815278c7
SHA101801c1702b5eb4e75372b8f2583f3562f48eea5
SHA25624f99c9f43628c7c98931a4dd18374b801ae9c73e25d6c00cdf2575cb6d82eae
SHA5121110342f1398f2ea21c17b6220e75da1a5d797c7b2cb857b91797292d6ef9c8c9540b8747028821f7eb800570886cf9f20f286d838390eb5378173afbfe59e11