Analysis
-
max time kernel
123s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12-01-2024 06:03
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-11_98462100c1d0f5ba0d31c5ccec1d4e6c_mafia_nionspy.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-11_98462100c1d0f5ba0d31c5ccec1d4e6c_mafia_nionspy.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-11_98462100c1d0f5ba0d31c5ccec1d4e6c_mafia_nionspy.exe
-
Size
280KB
-
MD5
98462100c1d0f5ba0d31c5ccec1d4e6c
-
SHA1
c294aed020960fc3966830a743b0a95c6ff89317
-
SHA256
63845e9634a6e29a742672bf3f8839042e3ba5e555a4721fb0ddd36b12d44636
-
SHA512
2115fa9cc02f20e7f487d5eb87b14893228e6606f308b862c648c8471c3039194b4cc41abfa32fa7dad29a7e173aa36014bc900c5aa03530da9894c95f170489
-
SSDEEP
6144:/Tz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDK:/TBPFV0RyWl3h2E+7pl
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2752 csrssys.exe 2600 csrssys.exe -
Loads dropped DLL 3 IoCs
pid Process 2312 2024-01-11_98462100c1d0f5ba0d31c5ccec1d4e6c_mafia_nionspy.exe 2312 2024-01-11_98462100c1d0f5ba0d31c5ccec1d4e6c_mafia_nionspy.exe 2312 2024-01-11_98462100c1d0f5ba0d31c5ccec1d4e6c_mafia_nionspy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 28 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\.exe\shell\runas 2024-01-11_98462100c1d0f5ba0d31c5ccec1d4e6c_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\wexplorer\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SView\\csrssys.exe\" /START \"%1\" %*" 2024-01-11_98462100c1d0f5ba0d31c5ccec1d4e6c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\.exe\shell 2024-01-11_98462100c1d0f5ba0d31c5ccec1d4e6c_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-01-11_98462100c1d0f5ba0d31c5ccec1d4e6c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\wexplorer\shell 2024-01-11_98462100c1d0f5ba0d31c5ccec1d4e6c_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-01-11_98462100c1d0f5ba0d31c5ccec1d4e6c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\.exe\shell\open 2024-01-11_98462100c1d0f5ba0d31c5ccec1d4e6c_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\wexplorer\DefaultIcon\ = "%1" 2024-01-11_98462100c1d0f5ba0d31c5ccec1d4e6c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\wexplorer\shell\open\command 2024-01-11_98462100c1d0f5ba0d31c5ccec1d4e6c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\.exe 2024-01-11_98462100c1d0f5ba0d31c5ccec1d4e6c_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\wexplorer\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-01-11_98462100c1d0f5ba0d31c5ccec1d4e6c_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\.exe\DefaultIcon\ = "%1" 2024-01-11_98462100c1d0f5ba0d31c5ccec1d4e6c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\wexplorer\shell\runas\command 2024-01-11_98462100c1d0f5ba0d31c5ccec1d4e6c_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\wexplorer\shell\runas\command\ = "\"%1\" %*" 2024-01-11_98462100c1d0f5ba0d31c5ccec1d4e6c_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\.exe\ = "wexplorer" 2024-01-11_98462100c1d0f5ba0d31c5ccec1d4e6c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\wexplorer 2024-01-11_98462100c1d0f5ba0d31c5ccec1d4e6c_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\wexplorer\Content-Type = "application/x-msdownload" 2024-01-11_98462100c1d0f5ba0d31c5ccec1d4e6c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\wexplorer\DefaultIcon 2024-01-11_98462100c1d0f5ba0d31c5ccec1d4e6c_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\wexplorer\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-01-11_98462100c1d0f5ba0d31c5ccec1d4e6c_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SView\\csrssys.exe\" /START \"%1\" %*" 2024-01-11_98462100c1d0f5ba0d31c5ccec1d4e6c_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\.exe\Content-Type = "application/x-msdownload" 2024-01-11_98462100c1d0f5ba0d31c5ccec1d4e6c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\.exe\DefaultIcon 2024-01-11_98462100c1d0f5ba0d31c5ccec1d4e6c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\.exe\shell\open\command 2024-01-11_98462100c1d0f5ba0d31c5ccec1d4e6c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\.exe\shell\runas\command 2024-01-11_98462100c1d0f5ba0d31c5ccec1d4e6c_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" 2024-01-11_98462100c1d0f5ba0d31c5ccec1d4e6c_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\wexplorer\ = "Application" 2024-01-11_98462100c1d0f5ba0d31c5ccec1d4e6c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\wexplorer\shell\open 2024-01-11_98462100c1d0f5ba0d31c5ccec1d4e6c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\wexplorer\shell\runas 2024-01-11_98462100c1d0f5ba0d31c5ccec1d4e6c_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2752 csrssys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2752 2312 2024-01-11_98462100c1d0f5ba0d31c5ccec1d4e6c_mafia_nionspy.exe 29 PID 2312 wrote to memory of 2752 2312 2024-01-11_98462100c1d0f5ba0d31c5ccec1d4e6c_mafia_nionspy.exe 29 PID 2312 wrote to memory of 2752 2312 2024-01-11_98462100c1d0f5ba0d31c5ccec1d4e6c_mafia_nionspy.exe 29 PID 2312 wrote to memory of 2752 2312 2024-01-11_98462100c1d0f5ba0d31c5ccec1d4e6c_mafia_nionspy.exe 29 PID 2752 wrote to memory of 2600 2752 csrssys.exe 28 PID 2752 wrote to memory of 2600 2752 csrssys.exe 28 PID 2752 wrote to memory of 2600 2752 csrssys.exe 28 PID 2752 wrote to memory of 2600 2752 csrssys.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-11_98462100c1d0f5ba0d31c5ccec1d4e6c_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-11_98462100c1d0f5ba0d31c5ccec1d4e6c_mafia_nionspy.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Roaming\Microsoft\SView\csrssys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SView\csrssys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SView\csrssys.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2752
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\SView\csrssys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SView\csrssys.exe"1⤵
- Executes dropped EXE
PID:2600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
278KB
MD528f4ac9b76eb91c56a072b1f34466425
SHA1f5128b0dd30ea1ced1334d8f9e5cc41aafe2d851
SHA25606aee6a795abf8205cacc797c7e81ec6fde66d638307bee452c7f9037fe0305f
SHA512e0d07211d17ea72e1043284937454216b95bcb85436e435c1dcb221c0a80c6aef2b58353d008cbd8d33dbd4724350cdc47ae1786c532fb22c3cc4a52cbf60b02
-
Filesize
115KB
MD5c2d1be67683b282769b497083aff3e7e
SHA1fef6923a3b8777727cf482f58b73d79f3b7af457
SHA25653682a3fbdbb3ad8c5a9dd12add1da33847e671c472300b5265bd8237d0dfbb3
SHA5128bfd005974dc4b85348862bf00c2edc50b8050be0928188e3794508093e0fc80d8ea59efb221c6ead7709dbb19b2f0c67380a2f4e9d2a9b702fddaef0dc3665c
-
Filesize
144KB
MD5345daadc4ceee10635fbe6f68734d48e
SHA15c1972b5a0bacd0b1da7874448e104d13c453580
SHA256d5066dfdca979319c4e6ffa714eba268041c4809db9fa7271a4de09e9e042185
SHA5128878dfa466eacf6d292a5ffa397751e5808088fc871d528e39f1549148d8af3fc2550ed1cd391d221017b12b39a91a17b0ec43b5f7117546b84c1eadad5bde0a
-
Filesize
131KB
MD5de7a0afffb5db93d17303c3012108892
SHA162a219b73356e607fb9e6a4812a146b06effbfc8
SHA25600316448c7bb44888033ac04eb611d29abc8a9c357005870f23e30c2f80aff27
SHA51287470c6a9336ff082e373f883e6d43ee85fdadc62aa63d58549b33dda58541e059f308fcac43af2295a0018faa04b5a86e4e7243d847f47daa7c325c06e29dee
-
Filesize
129KB
MD5ec74a94cb4ac7f2fd4e34594977ade30
SHA1c4de23ef6a6faf83c80d136ef60437edc1a19cfe
SHA256d18386f3ee3406951aae6f910c6e4f263468fbd2a60ccd373ad73a874369c634
SHA512ce6a6743181fc59106341e1c03611192c6f3c4257ceddc5b5c1c875f86efb8ed232df3c637d6478deca27c905c1f4a1d18707fbc4fe2008ac1fd7c58a92cce8d
-
Filesize
44KB
MD52edebcb488e490899e4162f497c1ad0c
SHA1aba7d31dc709e21e7851df9f088fac5d2213d646
SHA25696d83c3b5b9d604310a472625255ad7fe2cb63f90dc9ed8a8937c775829014a5
SHA51241b964c632ea2d612239faa598fec3034f43b6f196c100f38cad48cf9e8e8d390e69293ea6b9233ccf8cc02599e602f9a45c8f8acdc2882d0599b7d3e79e6d6f
-
Filesize
108KB
MD55a1892e78be3c857b95a448ac78f15e9
SHA141fdbdb401edb0db4fdaa5456dddbc9f858a6cb3
SHA25685af513596305c383ecbbbb53591485e8e4ba97252d82636cec73ddb54b076da
SHA512728c9aff5041b1ae02c390e3e8834e527b724384dd8871d1035db22bb920f78e5986c5440f6a640d91027b8ff52b77ba2ecaae85a5ff8d44ab7bab48cc2b4207