Analysis
-
max time kernel
168s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
22/10/2023, 10:49
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-09_3ccd4ece6ad546ec76e70016c194876c_mafia_nionspy_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-09_3ccd4ece6ad546ec76e70016c194876c_mafia_nionspy_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.2023-09-09_3ccd4ece6ad546ec76e70016c194876c_mafia_nionspy_JC.exe
-
Size
327KB
-
MD5
3ccd4ece6ad546ec76e70016c194876c
-
SHA1
e91d4a01eb3d034c2d6744db8f1727190903ce4c
-
SHA256
1e553d758f08fe7463384de0e8125d01f0e66f5235f187bba5316ddbea93f8ea
-
SHA512
03599916a3b4a745f694dc896952ea661d9f833c570b25bdea0c9dac9a1b5537c4a9a5e5b0df2eb8d0739c7c1ceb0d3e230235380952bedc3d86dd24bdb3e23e
-
SSDEEP
6144:u2+JS2sFafI8U0obHCW/2a7XQcsPMjVWrG8KgbPzDh:u2TFafJiHCWBWPMjVWrXK0
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-568313063-1441237985-1542345083-1000\Control Panel\International\Geo\Nation NEAS.2023-09-09_3ccd4ece6ad546ec76e70016c194876c_mafia_nionspy_JC.exe -
Executes dropped EXE 2 IoCs
pid Process 1348 csrssys.exe 968 csrssys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-568313063-1441237985-1542345083-1000_Classes\wexplorer\shell NEAS.2023-09-09_3ccd4ece6ad546ec76e70016c194876c_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-568313063-1441237985-1542345083-1000_Classes\wexplorer\shell\runas\command NEAS.2023-09-09_3ccd4ece6ad546ec76e70016c194876c_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-568313063-1441237985-1542345083-1000_Classes\.exe\DefaultIcon NEAS.2023-09-09_3ccd4ece6ad546ec76e70016c194876c_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-568313063-1441237985-1542345083-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_x86_64\\csrssys.exe\" /START \"%1\" %*" NEAS.2023-09-09_3ccd4ece6ad546ec76e70016c194876c_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-568313063-1441237985-1542345083-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" NEAS.2023-09-09_3ccd4ece6ad546ec76e70016c194876c_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-568313063-1441237985-1542345083-1000_Classes\.exe\shell\runas\command NEAS.2023-09-09_3ccd4ece6ad546ec76e70016c194876c_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-568313063-1441237985-1542345083-1000_Classes\wexplorer\DefaultIcon NEAS.2023-09-09_3ccd4ece6ad546ec76e70016c194876c_mafia_nionspy_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ NEAS.2023-09-09_3ccd4ece6ad546ec76e70016c194876c_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-568313063-1441237985-1542345083-1000_Classes\.exe\ = "wexplorer" NEAS.2023-09-09_3ccd4ece6ad546ec76e70016c194876c_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-568313063-1441237985-1542345083-1000_Classes\wexplorer\shell\open\command\IsolatedCommand = "\"%1\" %*" NEAS.2023-09-09_3ccd4ece6ad546ec76e70016c194876c_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-568313063-1441237985-1542345083-1000_Classes\wexplorer\Content-Type = "application/x-msdownload" NEAS.2023-09-09_3ccd4ece6ad546ec76e70016c194876c_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-568313063-1441237985-1542345083-1000_Classes\wexplorer\shell\open\command NEAS.2023-09-09_3ccd4ece6ad546ec76e70016c194876c_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-568313063-1441237985-1542345083-1000_Classes\wexplorer\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_x86_64\\csrssys.exe\" /START \"%1\" %*" NEAS.2023-09-09_3ccd4ece6ad546ec76e70016c194876c_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-568313063-1441237985-1542345083-1000_Classes\wexplorer\shell\runas\command\ = "\"%1\" %*" NEAS.2023-09-09_3ccd4ece6ad546ec76e70016c194876c_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-568313063-1441237985-1542345083-1000_Classes\.exe NEAS.2023-09-09_3ccd4ece6ad546ec76e70016c194876c_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-568313063-1441237985-1542345083-1000_Classes\wexplorer NEAS.2023-09-09_3ccd4ece6ad546ec76e70016c194876c_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-568313063-1441237985-1542345083-1000_Classes\.exe\shell NEAS.2023-09-09_3ccd4ece6ad546ec76e70016c194876c_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-568313063-1441237985-1542345083-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" NEAS.2023-09-09_3ccd4ece6ad546ec76e70016c194876c_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-568313063-1441237985-1542345083-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" NEAS.2023-09-09_3ccd4ece6ad546ec76e70016c194876c_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-568313063-1441237985-1542345083-1000_Classes\Local Settings NEAS.2023-09-09_3ccd4ece6ad546ec76e70016c194876c_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-568313063-1441237985-1542345083-1000_Classes\.exe\shell\open\command NEAS.2023-09-09_3ccd4ece6ad546ec76e70016c194876c_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-568313063-1441237985-1542345083-1000_Classes\.exe\DefaultIcon\ = "%1" NEAS.2023-09-09_3ccd4ece6ad546ec76e70016c194876c_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-568313063-1441237985-1542345083-1000_Classes\.exe\shell\open NEAS.2023-09-09_3ccd4ece6ad546ec76e70016c194876c_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-568313063-1441237985-1542345083-1000_Classes\wexplorer\shell\runas NEAS.2023-09-09_3ccd4ece6ad546ec76e70016c194876c_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-568313063-1441237985-1542345083-1000_Classes\wexplorer\DefaultIcon\ = "%1" NEAS.2023-09-09_3ccd4ece6ad546ec76e70016c194876c_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-568313063-1441237985-1542345083-1000_Classes\wexplorer\shell\runas\command\IsolatedCommand = "\"%1\" %*" NEAS.2023-09-09_3ccd4ece6ad546ec76e70016c194876c_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-568313063-1441237985-1542345083-1000_Classes\wexplorer\ = "Application" NEAS.2023-09-09_3ccd4ece6ad546ec76e70016c194876c_mafia_nionspy_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-568313063-1441237985-1542345083-1000_Classes\.exe\Content-Type = "application/x-msdownload" NEAS.2023-09-09_3ccd4ece6ad546ec76e70016c194876c_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-568313063-1441237985-1542345083-1000_Classes\.exe\shell\runas NEAS.2023-09-09_3ccd4ece6ad546ec76e70016c194876c_mafia_nionspy_JC.exe Key created \REGISTRY\USER\S-1-5-21-568313063-1441237985-1542345083-1000_Classes\wexplorer\shell\open NEAS.2023-09-09_3ccd4ece6ad546ec76e70016c194876c_mafia_nionspy_JC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1348 csrssys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 720 wrote to memory of 1348 720 NEAS.2023-09-09_3ccd4ece6ad546ec76e70016c194876c_mafia_nionspy_JC.exe 88 PID 720 wrote to memory of 1348 720 NEAS.2023-09-09_3ccd4ece6ad546ec76e70016c194876c_mafia_nionspy_JC.exe 88 PID 720 wrote to memory of 1348 720 NEAS.2023-09-09_3ccd4ece6ad546ec76e70016c194876c_mafia_nionspy_JC.exe 88 PID 1348 wrote to memory of 968 1348 csrssys.exe 89 PID 1348 wrote to memory of 968 1348 csrssys.exe 89 PID 1348 wrote to memory of 968 1348 csrssys.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-09_3ccd4ece6ad546ec76e70016c194876c_mafia_nionspy_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-09_3ccd4ece6ad546ec76e70016c194876c_mafia_nionspy_JC.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\csrssys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\csrssys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\csrssys.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\csrssys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\csrssys.exe"3⤵
- Executes dropped EXE
PID:968
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
327KB
MD55ec3062df25ab5e981a33063a2f7599d
SHA1544577fd771e4fbc994e9d93676a2e40d1d6c9ce
SHA256628705689b51faae5c9ed1fdee4aa4240a32eed2eb0519bd20b8b4b7c4e1f970
SHA512ef105fd0b79c40b192f6dd87faadfa18419e599c55b62acb7b375b75689abce21f50fc8abfaf1c192c4079ce975fc613323851f55c80494081ff1b9f028ec438
-
Filesize
327KB
MD55ec3062df25ab5e981a33063a2f7599d
SHA1544577fd771e4fbc994e9d93676a2e40d1d6c9ce
SHA256628705689b51faae5c9ed1fdee4aa4240a32eed2eb0519bd20b8b4b7c4e1f970
SHA512ef105fd0b79c40b192f6dd87faadfa18419e599c55b62acb7b375b75689abce21f50fc8abfaf1c192c4079ce975fc613323851f55c80494081ff1b9f028ec438
-
Filesize
327KB
MD55ec3062df25ab5e981a33063a2f7599d
SHA1544577fd771e4fbc994e9d93676a2e40d1d6c9ce
SHA256628705689b51faae5c9ed1fdee4aa4240a32eed2eb0519bd20b8b4b7c4e1f970
SHA512ef105fd0b79c40b192f6dd87faadfa18419e599c55b62acb7b375b75689abce21f50fc8abfaf1c192c4079ce975fc613323851f55c80494081ff1b9f028ec438
-
Filesize
327KB
MD55ec3062df25ab5e981a33063a2f7599d
SHA1544577fd771e4fbc994e9d93676a2e40d1d6c9ce
SHA256628705689b51faae5c9ed1fdee4aa4240a32eed2eb0519bd20b8b4b7c4e1f970
SHA512ef105fd0b79c40b192f6dd87faadfa18419e599c55b62acb7b375b75689abce21f50fc8abfaf1c192c4079ce975fc613323851f55c80494081ff1b9f028ec438