Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 05:56
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-09_770424cc3151c903f6fb7e26bb67d308_mafia_nionspy.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-09_770424cc3151c903f6fb7e26bb67d308_mafia_nionspy.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-09_770424cc3151c903f6fb7e26bb67d308_mafia_nionspy.exe
-
Size
280KB
-
MD5
770424cc3151c903f6fb7e26bb67d308
-
SHA1
025d453719601965a9ccb27a9995f83e847f73d1
-
SHA256
d2cedab7eb566fb39f660a7d47d735a837b894dce9e67e93b59046a325ca8ad3
-
SHA512
b02f95a950bfd94334a9ceab508b084e90c49b8f2f44b1d4e943adc726a4b674b19950f8da515324ffecc6c9d45f0f9d26afd92fc677f38ff15476404524d733
-
SSDEEP
6144:EQ+Tyfx4NF67Sbq2nW82X45gc3BaLZVS0mOoC8zbzDie:EQMyfmNFHfnWfhLZVHmOog
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation 2024-01-09_770424cc3151c903f6fb7e26bb67d308_mafia_nionspy.exe -
Executes dropped EXE 2 IoCs
pid Process 1908 wlogon32.exe 224 wlogon32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe\DefaultIcon\ = "%1" 2024-01-09_770424cc3151c903f6fb7e26bb67d308_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe\shell\runas 2024-01-09_770424cc3151c903f6fb7e26bb67d308_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\haldriver\Content-Type = "application/x-msdownload" 2024-01-09_770424cc3151c903f6fb7e26bb67d308_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe\Content-Type = "application/x-msdownload" 2024-01-09_770424cc3151c903f6fb7e26bb67d308_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\haldriver\shell\runas\command 2024-01-09_770424cc3151c903f6fb7e26bb67d308_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe\shell\open\command 2024-01-09_770424cc3151c903f6fb7e26bb67d308_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\haldriver\DefaultIcon\ = "%1" 2024-01-09_770424cc3151c903f6fb7e26bb67d308_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\haldriver\shell\open 2024-01-09_770424cc3151c903f6fb7e26bb67d308_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe\ = "haldriver" 2024-01-09_770424cc3151c903f6fb7e26bb67d308_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-01-09_770424cc3151c903f6fb7e26bb67d308_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\haldriver 2024-01-09_770424cc3151c903f6fb7e26bb67d308_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\haldriver\shell 2024-01-09_770424cc3151c903f6fb7e26bb67d308_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\Local Settings 2024-01-09_770424cc3151c903f6fb7e26bb67d308_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\haldriver\shell\runas\command\ = "\"%1\" %*" 2024-01-09_770424cc3151c903f6fb7e26bb67d308_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\haldriver\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-01-09_770424cc3151c903f6fb7e26bb67d308_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\haldriver\shell\runas 2024-01-09_770424cc3151c903f6fb7e26bb67d308_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe\shell\runas\command 2024-01-09_770424cc3151c903f6fb7e26bb67d308_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe\DefaultIcon 2024-01-09_770424cc3151c903f6fb7e26bb67d308_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe\shell 2024-01-09_770424cc3151c903f6fb7e26bb67d308_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 2024-01-09_770424cc3151c903f6fb7e26bb67d308_mafia_nionspy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2024-01-09_770424cc3151c903f6fb7e26bb67d308_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\haldriver\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_amd64\\wlogon32.exe\" /START \"%1\" %*" 2024-01-09_770424cc3151c903f6fb7e26bb67d308_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\haldriver\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-01-09_770424cc3151c903f6fb7e26bb67d308_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe\shell\open 2024-01-09_770424cc3151c903f6fb7e26bb67d308_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\haldriver\DefaultIcon 2024-01-09_770424cc3151c903f6fb7e26bb67d308_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe 2024-01-09_770424cc3151c903f6fb7e26bb67d308_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_amd64\\wlogon32.exe\" /START \"%1\" %*" 2024-01-09_770424cc3151c903f6fb7e26bb67d308_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-01-09_770424cc3151c903f6fb7e26bb67d308_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\haldriver\ = "Application" 2024-01-09_770424cc3151c903f6fb7e26bb67d308_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\haldriver\shell\open\command 2024-01-09_770424cc3151c903f6fb7e26bb67d308_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1908 wlogon32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4848 wrote to memory of 1908 4848 2024-01-09_770424cc3151c903f6fb7e26bb67d308_mafia_nionspy.exe 95 PID 4848 wrote to memory of 1908 4848 2024-01-09_770424cc3151c903f6fb7e26bb67d308_mafia_nionspy.exe 95 PID 4848 wrote to memory of 1908 4848 2024-01-09_770424cc3151c903f6fb7e26bb67d308_mafia_nionspy.exe 95 PID 1908 wrote to memory of 224 1908 wlogon32.exe 94 PID 1908 wrote to memory of 224 1908 wlogon32.exe 94 PID 1908 wrote to memory of 224 1908 wlogon32.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-09_770424cc3151c903f6fb7e26bb67d308_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-09_770424cc3151c903f6fb7e26bb67d308_mafia_nionspy.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\wlogon32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\wlogon32.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\wlogon32.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1908
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\wlogon32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\wlogon32.exe"1⤵
- Executes dropped EXE
PID:224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD56b81dd2032ee7e4cd056d24360a57cf2
SHA195dee30fd8744c81b437cde5a6839a2c07823073
SHA2569364662e1c4f3f4e3f289229526d734fe85d2513361381ff816c710bde151231
SHA5120752dacb6061adf4447511428e6d6e7a202521939a89a77d288588ab67de24381918763ec32ecbf6ef9ccb7409a4479e34721f1ff43862c78353e002078b3cee
-
Filesize
43KB
MD5536610a9265155b6d390444dba9cbade
SHA19161bb011da0869a0343251c5d48c9315d5f5647
SHA2567c4bb6555ffdf0ea9fc9561af928c85872b01f03ddb2df6336c6e10d8112d6f5
SHA5123194da6c720158e2a334b5ca57baea9c7e4dfa363f8f1c8a23c46c0d07ca95f5d44bf5211f6f41873a65ba66401c931fd4bc78952a1e0b1ddb36f12c830543a8
-
Filesize
280KB
MD56774872c4eaffc1f51947595e2e7d68b
SHA1ae35639e864ae4ce656862d727e7a2c1faf27275
SHA256170ad8048ff0c1faffc902969d209ba45147928b349c66f287d73866c050057e
SHA5124a14f4ee3d59e3e60375bd1fdad50226206f5e504750a6fa3cae93ff382666b845a2e8c110dd44719694f89c5b59d8edb8a8e5e65ec89d8e1dc9cd6ca9c5b29d