Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12/01/2024, 05:57

General

  • Target

    2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe

  • Size

    344KB

  • MD5

    41ea118a98de64213fbfea98e8a8d838

  • SHA1

    62504b08c719df19fb16477f77a2892a4ae25b49

  • SHA256

    5286df4aa0507d25c09590b2ad83a84505f4383e418653d899d155967790cf50

  • SHA512

    294dec89e50860ae09bd53f70513f9cdc4b3c07d258d304682c07a2a4c4f9521a201b97707bc50626be580875eaad6b82f8e40ee24fbfbe6008d10f697fb7885

  • SSDEEP

    6144:3Tz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDBRm1+gmN:3TBPFV0RyWl3h2E+7pYm0

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe"
    1⤵
    • Loads dropped DLL
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1792
    • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\wlogon32.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\wlogon32.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\wlogon32.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2704
  • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\wlogon32.exe
    "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\wlogon32.exe"
    1⤵
    • Executes dropped EXE
    PID:2828

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\wlogon32.exe

          Filesize

          93KB

          MD5

          0742af8c60199b5a1d968cd2a8ea2e1c

          SHA1

          d176c129d9e6fd61e9f60694fa17725290c8766f

          SHA256

          3e82b3fc8514addcafd96b4c664b5e33260b278d3ca60830b049caa3ecf005be

          SHA512

          a79c1316bea3c2a011bc06de16b1a137193c8a9c83b470a9bd99019901bc783aa60db98a45df5c496aa3ec4a6200a41023a35990400c843174cdbf9a32daffc3

        • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\wlogon32.exe

          Filesize

          92KB

          MD5

          7f512e37b781b30ff7d488cc3516dccc

          SHA1

          ff9ad2f2d4fe43a0e004635b89aa7e2197654201

          SHA256

          8ff69746e58d3d3133adebe9d6a3300426aac5a0255db5721e8ef55f8869c932

          SHA512

          d42d2cb3ef5a5c487e186da0ac8eb3d62a37f8659ab40cff871d35b319e3d941249de39f26d7ee579fd8a196c6daf20932168a74defa7b6b811dfc350f8633db

        • \Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\wlogon32.exe

          Filesize

          344KB

          MD5

          c65ea3a1c69e8fabeb926a0bf0e06d68

          SHA1

          9157e1f993610733083bb945b2e8c40658155278

          SHA256

          c418fbfad434779a3cd27c0d6a0ec1fd7a813c631492eedf6dad5ae7ce84a722

          SHA512

          45af17fb255dcfefb665a8222ca2c5ffb20ae2248c1a98efa9149e066e367acb0db42e085b1d8b17b7a7c17f09e6e8ae8da9c70a95fae7801a335f64a41e3217