Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/01/2024, 05:57
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe
-
Size
344KB
-
MD5
41ea118a98de64213fbfea98e8a8d838
-
SHA1
62504b08c719df19fb16477f77a2892a4ae25b49
-
SHA256
5286df4aa0507d25c09590b2ad83a84505f4383e418653d899d155967790cf50
-
SHA512
294dec89e50860ae09bd53f70513f9cdc4b3c07d258d304682c07a2a4c4f9521a201b97707bc50626be580875eaad6b82f8e40ee24fbfbe6008d10f697fb7885
-
SSDEEP
6144:3Tz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDBRm1+gmN:3TBPFV0RyWl3h2E+7pYm0
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2704 wlogon32.exe 2828 wlogon32.exe -
Loads dropped DLL 4 IoCs
pid Process 1792 2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe 1792 2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe 1792 2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe 2704 wlogon32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 28 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\haldriver\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\haldriver\shell\runas\command\ = "\"%1\" %*" 2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_32\\wlogon32.exe\" /START \"%1\" %*" 2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\haldriver\ = "Application" 2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\haldriver\DefaultIcon 2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\haldriver\shell\open\command 2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\haldriver\shell\open 2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\ = "haldriver" 2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\shell 2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\haldriver\Content-Type = "application/x-msdownload" 2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\shell\open 2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" 2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\haldriver\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\haldriver\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_32\\wlogon32.exe\" /START \"%1\" %*" 2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\haldriver\shell\runas 2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe 2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\DefaultIcon 2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\shell\runas\command 2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\haldriver\shell 2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\DefaultIcon\ = "%1" 2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\haldriver\DefaultIcon\ = "%1" 2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\haldriver\shell\runas\command 2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\Content-Type = "application/x-msdownload" 2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\shell\open\command 2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\shell\runas 2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\haldriver 2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2704 wlogon32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1792 wrote to memory of 2704 1792 2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe 25 PID 1792 wrote to memory of 2704 1792 2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe 25 PID 1792 wrote to memory of 2704 1792 2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe 25 PID 1792 wrote to memory of 2704 1792 2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe 25 PID 2704 wrote to memory of 2828 2704 wlogon32.exe 24 PID 2704 wrote to memory of 2828 2704 wlogon32.exe 24 PID 2704 wrote to memory of 2828 2704 wlogon32.exe 24 PID 2704 wrote to memory of 2828 2704 wlogon32.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-11_41ea118a98de64213fbfea98e8a8d838_mafia_nionspy.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\wlogon32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\wlogon32.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\wlogon32.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2704
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\wlogon32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\wlogon32.exe"1⤵
- Executes dropped EXE
PID:2828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD50742af8c60199b5a1d968cd2a8ea2e1c
SHA1d176c129d9e6fd61e9f60694fa17725290c8766f
SHA2563e82b3fc8514addcafd96b4c664b5e33260b278d3ca60830b049caa3ecf005be
SHA512a79c1316bea3c2a011bc06de16b1a137193c8a9c83b470a9bd99019901bc783aa60db98a45df5c496aa3ec4a6200a41023a35990400c843174cdbf9a32daffc3
-
Filesize
92KB
MD57f512e37b781b30ff7d488cc3516dccc
SHA1ff9ad2f2d4fe43a0e004635b89aa7e2197654201
SHA2568ff69746e58d3d3133adebe9d6a3300426aac5a0255db5721e8ef55f8869c932
SHA512d42d2cb3ef5a5c487e186da0ac8eb3d62a37f8659ab40cff871d35b319e3d941249de39f26d7ee579fd8a196c6daf20932168a74defa7b6b811dfc350f8633db
-
Filesize
344KB
MD5c65ea3a1c69e8fabeb926a0bf0e06d68
SHA19157e1f993610733083bb945b2e8c40658155278
SHA256c418fbfad434779a3cd27c0d6a0ec1fd7a813c631492eedf6dad5ae7ce84a722
SHA51245af17fb255dcfefb665a8222ca2c5ffb20ae2248c1a98efa9149e066e367acb0db42e085b1d8b17b7a7c17f09e6e8ae8da9c70a95fae7801a335f64a41e3217