Analysis
-
max time kernel
0s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 12:19
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-06_f9d0c639745a5e401f0d20ebf06443b7_mafia_nionspy.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-06_f9d0c639745a5e401f0d20ebf06443b7_mafia_nionspy.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-06_f9d0c639745a5e401f0d20ebf06443b7_mafia_nionspy.exe
-
Size
280KB
-
MD5
f9d0c639745a5e401f0d20ebf06443b7
-
SHA1
7b71f691f8ffe8ee4b343aad2174d669000f8292
-
SHA256
78d48ac8c9e67c6c85870f476093300f0803e2ca0bd4017408a5f9cf46de2cd9
-
SHA512
251e559e4b9ba64669e616fb45099af1d218f41aa40da65dc909e16472323b1fdd3a03a709abd9131a60ef9248cd9070a67d7400439535137d1df4e921ba6e7a
-
SSDEEP
6144:mTz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDK:mTBPFV0RyWl3h2E+7pl
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 28 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\halnt\shell\open\command 2024-01-06_f9d0c639745a5e401f0d20ebf06443b7_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-01-06_f9d0c639745a5e401f0d20ebf06443b7_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\.exe\shell\runas 2024-01-06_f9d0c639745a5e401f0d20ebf06443b7_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\halnt\DefaultIcon\ = "%1" 2024-01-06_f9d0c639745a5e401f0d20ebf06443b7_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\halnt\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Posix\\lsassys.exe\" /START \"%1\" %*" 2024-01-06_f9d0c639745a5e401f0d20ebf06443b7_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\halnt\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-01-06_f9d0c639745a5e401f0d20ebf06443b7_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\.exe\ = "halnt" 2024-01-06_f9d0c639745a5e401f0d20ebf06443b7_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\.exe\shell\open\command 2024-01-06_f9d0c639745a5e401f0d20ebf06443b7_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\.exe\shell\runas\command 2024-01-06_f9d0c639745a5e401f0d20ebf06443b7_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\halnt\shell\open 2024-01-06_f9d0c639745a5e401f0d20ebf06443b7_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\.exe\Content-Type = "application/x-msdownload" 2024-01-06_f9d0c639745a5e401f0d20ebf06443b7_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\.exe\shell\open 2024-01-06_f9d0c639745a5e401f0d20ebf06443b7_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\halnt 2024-01-06_f9d0c639745a5e401f0d20ebf06443b7_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\halnt\ = "Application" 2024-01-06_f9d0c639745a5e401f0d20ebf06443b7_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\halnt\shell\runas\command\ = "\"%1\" %*" 2024-01-06_f9d0c639745a5e401f0d20ebf06443b7_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\.exe 2024-01-06_f9d0c639745a5e401f0d20ebf06443b7_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\halnt\shell\runas\command 2024-01-06_f9d0c639745a5e401f0d20ebf06443b7_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\.exe\DefaultIcon 2024-01-06_f9d0c639745a5e401f0d20ebf06443b7_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Posix\\lsassys.exe\" /START \"%1\" %*" 2024-01-06_f9d0c639745a5e401f0d20ebf06443b7_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 2024-01-06_f9d0c639745a5e401f0d20ebf06443b7_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-01-06_f9d0c639745a5e401f0d20ebf06443b7_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\halnt\Content-Type = "application/x-msdownload" 2024-01-06_f9d0c639745a5e401f0d20ebf06443b7_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\halnt\DefaultIcon 2024-01-06_f9d0c639745a5e401f0d20ebf06443b7_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\halnt\shell 2024-01-06_f9d0c639745a5e401f0d20ebf06443b7_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\.exe\DefaultIcon\ = "%1" 2024-01-06_f9d0c639745a5e401f0d20ebf06443b7_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\halnt\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-01-06_f9d0c639745a5e401f0d20ebf06443b7_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\halnt\shell\runas 2024-01-06_f9d0c639745a5e401f0d20ebf06443b7_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\.exe\shell 2024-01-06_f9d0c639745a5e401f0d20ebf06443b7_mafia_nionspy.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-06_f9d0c639745a5e401f0d20ebf06443b7_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-06_f9d0c639745a5e401f0d20ebf06443b7_mafia_nionspy.exe"1⤵
- Modifies registry class
PID:1060 -
C:\Users\Admin\AppData\Roaming\Microsoft\Posix\lsassys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Posix\lsassys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\lsassys.exe"2⤵PID:2984
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Posix\lsassys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Posix\lsassys.exe"1⤵PID:5020