Analysis

  • max time kernel
    0s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/01/2024, 12:19

General

  • Target

    2024-01-06_f9d0c639745a5e401f0d20ebf06443b7_mafia_nionspy.exe

  • Size

    280KB

  • MD5

    f9d0c639745a5e401f0d20ebf06443b7

  • SHA1

    7b71f691f8ffe8ee4b343aad2174d669000f8292

  • SHA256

    78d48ac8c9e67c6c85870f476093300f0803e2ca0bd4017408a5f9cf46de2cd9

  • SHA512

    251e559e4b9ba64669e616fb45099af1d218f41aa40da65dc909e16472323b1fdd3a03a709abd9131a60ef9248cd9070a67d7400439535137d1df4e921ba6e7a

  • SSDEEP

    6144:mTz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDK:mTBPFV0RyWl3h2E+7pl

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-06_f9d0c639745a5e401f0d20ebf06443b7_mafia_nionspy.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-06_f9d0c639745a5e401f0d20ebf06443b7_mafia_nionspy.exe"
    1⤵
    • Modifies registry class
    PID:1060
    • C:\Users\Admin\AppData\Roaming\Microsoft\Posix\lsassys.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\lsassys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\lsassys.exe"
      2⤵
        PID:2984
    • C:\Users\Admin\AppData\Roaming\Microsoft\Posix\lsassys.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\lsassys.exe"
      1⤵
        PID:5020

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads