Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09-01-2024 06:36
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-08_10b79bd646e5d7a181a6add9610f126c_mafia_nionspy.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-08_10b79bd646e5d7a181a6add9610f126c_mafia_nionspy.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-08_10b79bd646e5d7a181a6add9610f126c_mafia_nionspy.exe
-
Size
288KB
-
MD5
10b79bd646e5d7a181a6add9610f126c
-
SHA1
d8c66b6966cfc2bcdf2ed713b553799e05a37ea0
-
SHA256
6e1b4a470c9b5150d47c21ac7207ce30c554e66f805dd874831e150486d3a6d3
-
SHA512
a697411f116726f9ffcfe486ebe0cb99e66fe96e411be9a58b888ca32ad4c789c88bdae33b1bb369da89d78debf562872c3eaa352a62de36a2e64a1b0c9ab969
-
SSDEEP
6144:TQ+Tyfx4NF67Sbq2nW82X45gc3BaLZVS0mOoC8zbzDie:TQMyfmNFHfnWfhLZVHmOog
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2688 taskhostsys.exe 2828 taskhostsys.exe -
Loads dropped DLL 4 IoCs
pid Process 3024 2024-01-08_10b79bd646e5d7a181a6add9610f126c_mafia_nionspy.exe 3024 2024-01-08_10b79bd646e5d7a181a6add9610f126c_mafia_nionspy.exe 3024 2024-01-08_10b79bd646e5d7a181a6add9610f126c_mafia_nionspy.exe 2688 taskhostsys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 28 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\jitc\ = "Application" 2024-01-08_10b79bd646e5d7a181a6add9610f126c_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-01-08_10b79bd646e5d7a181a6add9610f126c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\jitc\shell 2024-01-08_10b79bd646e5d7a181a6add9610f126c_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\jitc\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-01-08_10b79bd646e5d7a181a6add9610f126c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\DefaultIcon 2024-01-08_10b79bd646e5d7a181a6add9610f126c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\shell 2024-01-08_10b79bd646e5d7a181a6add9610f126c_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-01-08_10b79bd646e5d7a181a6add9610f126c_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\jitc\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Sys32\\taskhostsys.exe\" /START \"%1\" %*" 2024-01-08_10b79bd646e5d7a181a6add9610f126c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\shell\open\command 2024-01-08_10b79bd646e5d7a181a6add9610f126c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\shell\runas\command 2024-01-08_10b79bd646e5d7a181a6add9610f126c_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" 2024-01-08_10b79bd646e5d7a181a6add9610f126c_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\jitc\DefaultIcon\ = "%1" 2024-01-08_10b79bd646e5d7a181a6add9610f126c_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\jitc\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-01-08_10b79bd646e5d7a181a6add9610f126c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\jitc\shell\runas\command 2024-01-08_10b79bd646e5d7a181a6add9610f126c_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\ = "jitc" 2024-01-08_10b79bd646e5d7a181a6add9610f126c_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\Content-Type = "application/x-msdownload" 2024-01-08_10b79bd646e5d7a181a6add9610f126c_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Sys32\\taskhostsys.exe\" /START \"%1\" %*" 2024-01-08_10b79bd646e5d7a181a6add9610f126c_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\jitc\Content-Type = "application/x-msdownload" 2024-01-08_10b79bd646e5d7a181a6add9610f126c_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\jitc\shell\runas\command\ = "\"%1\" %*" 2024-01-08_10b79bd646e5d7a181a6add9610f126c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\jitc 2024-01-08_10b79bd646e5d7a181a6add9610f126c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\jitc\DefaultIcon 2024-01-08_10b79bd646e5d7a181a6add9610f126c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\jitc\shell\runas 2024-01-08_10b79bd646e5d7a181a6add9610f126c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\shell\open 2024-01-08_10b79bd646e5d7a181a6add9610f126c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\jitc\shell\open\command 2024-01-08_10b79bd646e5d7a181a6add9610f126c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\jitc\shell\open 2024-01-08_10b79bd646e5d7a181a6add9610f126c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe 2024-01-08_10b79bd646e5d7a181a6add9610f126c_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\DefaultIcon\ = "%1" 2024-01-08_10b79bd646e5d7a181a6add9610f126c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\shell\runas 2024-01-08_10b79bd646e5d7a181a6add9610f126c_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2688 taskhostsys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2688 3024 2024-01-08_10b79bd646e5d7a181a6add9610f126c_mafia_nionspy.exe 20 PID 3024 wrote to memory of 2688 3024 2024-01-08_10b79bd646e5d7a181a6add9610f126c_mafia_nionspy.exe 20 PID 3024 wrote to memory of 2688 3024 2024-01-08_10b79bd646e5d7a181a6add9610f126c_mafia_nionspy.exe 20 PID 3024 wrote to memory of 2688 3024 2024-01-08_10b79bd646e5d7a181a6add9610f126c_mafia_nionspy.exe 20 PID 2688 wrote to memory of 2828 2688 taskhostsys.exe 19 PID 2688 wrote to memory of 2828 2688 taskhostsys.exe 19 PID 2688 wrote to memory of 2828 2688 taskhostsys.exe 19 PID 2688 wrote to memory of 2828 2688 taskhostsys.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-08_10b79bd646e5d7a181a6add9610f126c_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-08_10b79bd646e5d7a181a6add9610f126c_mafia_nionspy.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\taskhostsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\taskhostsys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\taskhostsys.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2688
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\taskhostsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\taskhostsys.exe"1⤵
- Executes dropped EXE
PID:2828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD50e7fb9e1f4c2af9a0e24ea71abe9081e
SHA1446bb4ecb60210d8e1449db76f633f5c3587290a
SHA2569b6933e04bf918ec2184fb71758e1a10f8392e660379c6d82fcb5751ab7f30e2
SHA512f3ad329d1c78299197935d4ec25ea5beb18d4471bbce1057bf254d3199b1bfdc33cd3aa980ad650516c0f0d0e10509237cdfd76c6686f0377cd8209fedd0fdaa
-
Filesize
7KB
MD500a8dd3209eeb95e56a5caeaadc9abdf
SHA1e1200f665da552c45763a8834bf62f2420b590b8
SHA2563a79e06e1dd260927707cb79abfb2db678622c5addc014eaadc76a026a359d03
SHA5129e30a820eb6568e3221cf8691bce88120231e51b25cfab82b4e3ab29be79d09a4d7c65211deff5befc9b9d7b7cafe7b42a34a01ae577e510b5afd5c6206fc9b5
-
Filesize
29KB
MD5d07e2d6f7c5c9e66386887084132546e
SHA1b7da92429c602e58ee6c11dca728865a9f8262ef
SHA256eb9d49c2fe432f7218262adace59cd236f7040bf863ef94ced7e0fee6382bbc3
SHA512f8f3f0393ded37252a62d52cfe3946a43c7f4f13c251c8227a84bc2b4ffd015f0c3d95a53ccf51e04a6fc1dc463e3361e881415675413d5b49172f992b1d2451
-
Filesize
32KB
MD55abc22100c09af678036a3dbd29e6000
SHA130ae87a8d8610ebe52812f99f7af26235eed520e
SHA25611481b972f20c2e3a6c79bf0e85be1d9b1521d1ae7572b095455cc14a7092fff
SHA5124c80f559b0384061a1df29aa582c3981a107f000c3f0e87b1f1ae96e63a39e2826f51dbc5257de06dede2955e4aeca60b55473fc18861f55b220d92aa3198806
-
Filesize
288KB
MD5cdbfadb73669d8f7f9da71220a216f3a
SHA15fffc691c8ef65b5f987645743fa04655cb44895
SHA256f1249312a741fc02e5c8a56f07595a876bf8e35335d3dbf8212ca8664ee63b78
SHA5126da1dddda523840eb670ad092a2aaa7e4a148133efa054b69e4d85a55bcc9a4eefe4227de0f293b9e1db101c72b16368ecac289e950cd6e4a4ec57f6f4b9372f